BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
model (1528)
system (1181)
base (1142)
analysi (842)
softwar (669)

Stem use$ (all stems)

12257 papers:

CBSECBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented #using
Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSAECSA-2015-AgrawalP #adaptation #framework #towards #using #web
Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSAECSA-2015-GalsterA #agile #architecture #comprehension #development
Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSAECSA-2015-HansenM #automation #community #composition #detection #using
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSAECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech #using
Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
ECSAECSA-2015-WangC #architecture #network #performance #social
A Specialised Social Network Software Architecture for Efficient Household Water Use Management (ZW, AC), pp. 146–153.
QoSAQoSA-2015-HofigZS #automation #dependence #using
Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
CASECASE-2015-AmriBARF #multi #robust #using
Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASECASE-2015-ArdakaniORJ #generative #predict #realtime #using
Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASECASE-2015-BergagardF #automation #on the #using
On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASECASE-2015-CarliDEAV #automation #evaluation #using
Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASECASE-2015-CarliDPR #energy #multi #optimisation #performance #using
Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChengHL #automation #petri net #robust #synthesis #using
Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASECASE-2015-ChenH #assembly #automation #distributed #petri net #using
Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASECASE-2015-DobslawGZ #challenge #industrial #network
Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASECASE-2015-FarhanPWL #algorithm #machine learning #predict #using
Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism #using
A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASECASE-2015-FerreiraBGV #framework #using
Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASECASE-2015-ForstnerM #optimisation #safety #using
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASECASE-2015-GiulianiC #optimisation #problem
Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASECASE-2015-JiaJCS #locality #named #using
SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASECASE-2015-KaipaTSKLG #automation #using
Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASECASE-2015-KeroglouH #communication #constraints #distributed #using
Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASECASE-2015-KimCLJ #design #estimation #using
Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASECASE-2015-KreutzerRREL #automation #detection #metric #using
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-LeeKK #online #parametricity #using
Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASECASE-2015-LiangSQLY #agile #assessment #development #using
Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASECASE-2015-LinZW #predict #realtime #using
Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASECASE-2015-LiuC #algorithm #evaluation #performance #quality #using
A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASECASE-2015-McKinleyGSKMNLP #single use
A single-use haptic palpation probe for locating subcutaneous blood vessels in robot-assisted minimally invasive surgery (SM, AG, SS, RK, AM, KAN, SL, SP, PA, AMO, KG), pp. 1151–1158.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-MillerM #locality #using
Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASECASE-2015-ParisACAR #behaviour #learning #markov #smarttech #using
Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASECASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming #using
Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASECASE-2015-QuangTH #adaptation #using
FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASECASE-2015-RoyelYLLH #identification #optimisation #parametricity #using
A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASECASE-2015-SaksenaNKK #2d #assembly #automation #parametricity #using
Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASECASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling #using
Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASECASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network #using
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASECASE-2015-TorresP #multi #using
Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASECASE-2015-WahrburgMCMD #estimation #using
Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASECASE-2015-WareS #synthesis #using
Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASECASE-2015-Yen #realtime #using
Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASECASE-2015-ZafarKSMJA #health #monitoring #process #using
Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASECASE-2015-ZhangTYL #assessment #markov #reliability #using
CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASECASE-2015-ZhuCS #energy #linear #process #recognition #using
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASECASE-2015-ZonEHJVSB #detection #multi #realtime #using
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
DACDAC-2015-AsadJ #programming #using #verification
Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DACDAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #using #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-Engblom #integration #using
Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DACDAC-2015-HanKL #design #evaluation #using
Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DACDAC-2015-HelalBH #parallel #simulation #using
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-HerdtLD #simulation #using #verification
Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DACDAC-2015-LahiouelZT #smt #towards #using
Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based #using
Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DACDAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis #using
Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DACDAC-2015-TashjianD #identification #on the #using
On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DACDAC-2015-TsaiYPLTCC #design #energy #in memory #memory management #using
Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DACDAC-2015-XuLP #adaptation #modelling #physics #statistics #using
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DACDAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation #using
An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATEDATE-2015-AhsanK #architecture #optimisation #quantum #using
Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATEDATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BarraganL #case study #feature model #using
Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATEDATE-2015-BillointSRVBFRC #2d #3d #design #using
A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATEDATE-2015-CakirM #clustering #correlation #detection #hardware #using
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-ChangD #analysis #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics #using
Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATEDATE-2015-CuiZSW #towards #using
Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATEDATE-2015-DarkeCVSM #approximate #bound #model checking #using
Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATEDATE-2015-ErolOSPB #metric #using
On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATEDATE-2015-FernandoWNKC #agile #algorithm #design #synthesis #using
(AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATEDATE-2015-HashemianSWWCP #array #authentication #robust #using
A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATEDATE-2015-HerberRWH #realtime #scheduling #using
Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATEDATE-2015-JiRML #hardware #implementation #logic #network #probability #using
A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATEDATE-2015-KauerNLSC #geometry #optimisation #programming #using
Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATEDATE-2015-LiaperdosSATAL #deployment #performance #using
Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATEDATE-2015-LiJHWCGLKW #design #optimisation #using
Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATEDATE-2015-LiXWNP #fine-grained #multi #power management #reduction #using
Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATEDATE-2015-LourencoMH #using
Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATEDATE-2015-MadhukarSWKM #abstraction #lazy evaluation #using #verification
Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATEDATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability #using
MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATEDATE-2015-PaulinoFBC #configuration management #execution #hardware #using
Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATEDATE-2015-RanjanRVPRR #configuration management #memory management #named #using
DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATEDATE-2015-SaifhashemiHBB #equivalence #logic #tool support #using
Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATEDATE-2015-SalfelderH #adaptation #evaluation #simulation #using
Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATEDATE-2015-ShutoYS #architecture #case study #comparative #using
Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATEDATE-2015-StrobelBOSP #named #using
Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATEDATE-2015-SunKPE #algebra #geometry #using #verification
Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATEDATE-2015-TangXLLCWY #network #question
Spiking neural network with RRAM: can we use it for real-world application? (TT, LX, BL, RL, YC, YW, HY), pp. 860–865.
DATEDATE-2015-TanLF #memory management #reliability #using
Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATEDATE-2015-TeysseyreNOCCG #performance #set #simulation #using
Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATEDATE-2015-TouatiBDGVBR #functional #power management #source code #testing
Exploring the impact of functional test programs re-used for power-aware testing (AT, AB, LD, PG, AV, PB, MSR), pp. 1277–1280.
DATEDATE-2015-VenkataramanKSE #design #heuristic #using
Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATEDATE-2015-WengCCHW #using
Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATEDATE-2015-YuSHEAB #library #multi #statistics #using
Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATEDATE-2015-ZhuM #linear #machine learning #optimisation #programming #using
Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
DocEngDocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary #using
Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEngDocEng-2015-LesnikovaDE #rdf #using
Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRRDRR-2015-BideaultMCP #architecture #regular expression #using #word
Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRRDRR-2015-MehriSHGAM #documentation #image #segmentation
Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRRDRR-2015-PengCN #approach #using
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRRDRR-2015-RabaevCEK #documentation #programming #using
Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRRDRR-2015-SitaramHPSK #recognition #using #word
Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRRDRR-2015-StalnakerZ #retrieval #using
Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HTHT-2015-BlountMW #logic #social #web
An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
PODSPODS-2015-CateCST #ontology #using
High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMODSIGMOD-2015-BarthelsLAK #in memory #using
Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMODSIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media #using
DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMODSIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability #using
Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMODSIGMOD-2015-TuR #named #query #using
DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMODSIGMOD-2015-UpadhyayaBS #automation #policy
Automatic Enforcement of Data Use Policies with DataLawyer (PU, MB, DS), pp. 213–225.
SIGMODSIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel #using
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-XiaoBME #metadata #summary #using
Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMODSIGMOD-2015-YanZHSMZM #detection #distributed #using
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMODSIGMOD-2015-ZhangCPSX #graph #statistics #using
Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDBVLDB-2015-DeutchGM #datalog #query #source code #using
Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDBVLDB-2015-HeCMPS #named #synthesis #using
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDBVLDB-2015-HeGC #corpus #named #semantics #using
SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDBVLDB-2015-LazersonSKSGS #distributed #monitoring #using
Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDBVLDB-2015-ParkMS #pipes and filters #probability #query #using
Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDBVLDB-2015-ShinWWSZR #incremental #knowledge base #using
Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEETCSEET-2015-SedanoP #experience #student #using
Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
ITiCSEITiCSE-2015-Dickson #development #education #game studies #using
Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSEITiCSE-2015-Harms15a #java #using
Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSEITiCSE-2015-KirkpatrickP #assurance #operating system #process #using
Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSEITiCSE-2015-MishraI #data type #student
Question-Posing strategies used by students for exploring Data Structures (SM, SI), pp. 171–176.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-TarmazdiVSFF #learning #using #visualisation
Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSEITiCSE-2015-WangMSLCW #data access #education #named #using #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
FASEFASE-2015-AndriescuMI #automaton #data type #using
Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
TACASTACAS-2015-BransenBCD #attribute grammar #order #scheduling #using
Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-KriouileS #formal method #using #verification
Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACASTACAS-2015-Thierry-Mieg #model checking #using
Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
ICPCICPC-2015-CosmaM #component #comprehension #using #visual notation #web
Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPCICPC-2015-Escobar-AvilaVH #bytecode #categorisation #using
Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPCICPC-2015-HillSP #evaluation #feature model
Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how #using
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework #using
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MacLeodSB #developer #documentation #how #using
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-MartinCAA #analysis #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaiedABS #api #library #question #source code #using
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-CorleyDK #feature model #learning
Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSMEICSME-2015-DongAS #fault #static analysis #using
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface #using
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-HardtM #empirical #evaluation #maintenance #using
An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSMEICSME-2015-MedicherlaKN #specification #using #verification
Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification #using
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-BosuGB #code review #empirical
Characteristics of Useful Code Reviews: An Empirical Study at Microsoft (AB, MG, CB), pp. 146–156.
MSRMSR-2015-DonadelliZR #case study #fault #replication #using
Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSRMSR-2015-WangPWG #comprehension #git #what
What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSRMSR-2015-ZanjaniKB #developer #using
Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-BezemerPG #comprehension #difference #graph #performance #using
Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANERSANER-2015-CabotICR #open source
Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANERSANER-2015-HuSLL #development #evolution #modelling #topic #using
Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-NayrollesHTL #approach #debugging #model checking #named #using
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-QiuSM #graph #identification #library #morphism #using
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAMSCAM-2015-BonifacioCRKC #c++ #exception
The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAMSCAM-2015-ChochlovEB #data flow #feature model #using
Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-PanditaJSW #api #mining #using
Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code #using
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-RenatusBE #modelling #security #using
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #using #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
PLDIPLDI-2015-BarowyGHZ #named #relational #spreadsheet #using
FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDIPLDI-2015-CraryS #peer-to-peer #using
Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDIPLDI-2015-GonnordMR #ranking #synthesis #using
Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
SASSAS-2015-AdjeGM #generative #invariant #optimisation #polynomial #using
Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
STOCSTOC-2015-AggarwalDRS #problem #using
Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOCSTOC-2015-Czumaj #network #permutation #random #using
Random Permutations using Switching Networks (AC), pp. 703–712.
ICALPICALP-v1-2015-KhotS #approximate #using
Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FMFM-2015-0001K #bound #model checking #using
Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FMFM-2015-AlTurkiA #distributed #framework #towards #using #verification #𝕂
Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-MirandaMR #automation #design #generative #testing #using #verification
Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FMFM-2015-Nakajima #behaviour #energy #maude #realtime #using
Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
SEFMSEFM-2015-JonesY #abstraction #reasoning #using
Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFMSEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing #using
Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFMSEFM-2015-SavaryFLL #modelling #robust #testing #using
Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFPICFP-2015-Russo #functional #haskell
Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance #using
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #policy
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGTICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination #using
Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-WeberDP #formal method #graph transformation #monitoring #using
Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHICHI-2015-AsenieroWLRTC #named #release planning #using #visualisation
STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHICHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation #using
Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHICHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer #using
A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHICHI-2015-BentleyC #composition #mobile
The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHICHI-2015-DaltonCM #using
Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHICHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social #using
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-FleckCR #bound #multi #using
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-GaoYHF #automation #collaboration #game studies #how #multi
Improving Multilingual Collaboration by Displaying How Non-native Speakers Use Automated Transcripts and Bilingual Dictionaries (GG, NY, AMJH, SRF), pp. 3463–3472.
CHICHI-2015-GerlingML #game studies #video
Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHICHI-2015-Gilbert #abstraction
Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages (EG), pp. 477–486.
CHICHI-2015-GoelZVP #detection #flexibility #gesture #named #using
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-GrevetG #prototype #scalability #social #using
Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHICHI-2015-GunaratneN #behaviour #performance #user interface #using
Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHICHI-2015-HaqueNV #named #using
Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHICHI-2015-HiguchiCCZL #experience #named #using
ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHICHI-2015-HillmanW #approach #social #social media
Situated Social Media Use: A Methodological Approach to Locating Social Media Practices and Trajectories (TH, AW), pp. 4057–4060.
CHICHI-2015-HinikerSSSLK #how #mobile
Texting while Parenting: How Adults Use Mobile Phones while Caring for Children at the Playground (AH, KS, HS, YCS, CPL, JAK), pp. 727–736.
CHICHI-2015-HolzBK #identification #mobile #named #using
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHICHI-2015-HourcadeMWP #analysis #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HydeCKH #interactive #persuasion #using
Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHICHI-2015-JonesCDTPDH #delphi #information management #using
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-KatanGF #development #interactive #interface #machine learning #people #using
Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHICHI-2015-KjeldskovSPLMN
Eco-Forecasting for Domestic Electricity Use (JK, MBS, JP, DL, TM, MN), pp. 1985–1988.
CHICHI-2015-KosmallaDK #automation #metric #named #recognition #using
ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHICHI-2015-LeeLCWSK #education #interactive #online #social #using
Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHICHI-2015-LopesJB #communication
Affordance++: Allowing Objects to Communicate Dynamic Use (PL, PJ, PB), pp. 2515–2524.
CHICHI-2015-LugerURG #design #game studies #process #using
Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHICHI-2015-MaiorPSW #human-computer #reliability #using
Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHICHI-2015-MariakakisGAPW #mobile #named #using
SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHICHI-2015-ParkPN
The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHICHI-2015-PatelO
Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHICHI-2015-PfeifferDSAR #using
Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHICHI-2015-PierceP #design #multi
Making Multiple Uses of the Obscura 1C Digital Camera: Reflecting on the Design, Production, Packaging and Distribution of a Counterfunctional Device (JP, EP), pp. 2103–2112.
CHICHI-2015-PreistJ #education #game studies #motivation
The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHICHI-2015-RobbPKC #crowdsourcing #design #feedback #question
Crowdsourced Feedback With Imagery Rather Than Text: Would Designers Use It? (DAR, SP, BK, MJC), pp. 1355–1364.
CHICHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics #using
Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHICHI-2015-SlegersRVD #elicitation #game studies #research #user interface #using
Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHICHI-2015-TholanderN #experience #performance
Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHICHI-2015-VertanenMERK #mobile #named #performance #using
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHICHI-2015-WangGXZYB #interactive #named #privacy #using #visualisation
VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHICHI-2015-ZugerF #developer #predict #using
Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCWCSCW-2015-BakhshiKS #comprehension #online #question
Understanding Online Reviews: Funny, Cool or Useful? (SB, PK, DAS), pp. 1270–1276.
CSCWCSCW-2015-BossenG #collaboration #design #flexibility
Collaboration in-between: The Care Hotel and Designing for Flexible Use (CB, EG), pp. 1289–1301.
CSCWCSCW-2015-ChangHT #recommendation #using
Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCWCSCW-2015-FreitasD15a #detection #multi #using
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCWCSCW-2015-KaziunasBJCHA #health
Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCWCSCW-2015-KoYLHJLSYSC #named #self #smarttech
NUGU: A Group-based Intervention App for Improving Self-Regulation of Limiting Smartphone Use (MK, SY, JL, CH, JJ, UL, DS, KY, JS, KMC), pp. 1235–1245.
CSCWCSCW-2015-LiuIP #comprehension #how #maintenance #quote
“I’m Not Like My Friends”: Understanding How Children with a Chronic Illness Use Technology to Maintain Normalcy (LSL, KMI, WP), pp. 1527–1539.
CSCWCSCW-2015-MaddockSASOM #behaviour #multi #online #using
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCWCSCW-2015-MatthewsMCMHB #community #what
They Said What?: Exploring the Relationship Between Language Use and Member Satisfaction in Communities (TM, JUM, JC, MM, EMH, HB), pp. 819–825.
CSCWCSCW-2015-ProstMT #design #energy #towards #using
From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCWCSCW-2015-WangNMRW #social #social media #student
Coming of Age (Digitally): An Ecological View of Social Media Use among College Students (YW, MN, GM, SMR, MW), pp. 571–582.
CSCWCSCW-2015-XuRDB #design #feedback #process #using
A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
HCIDHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition #using
Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
HCIDHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition #using
Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
HCIDHM-EH-2015-IkenoboMK
Usefulness of Ikebana a Nursing Care Environment (YI, YM, AK), pp. 441–447.
HCIDHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process #using
Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
HCIDHM-EH-2015-MeryS #modelling #requirements #using
Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
HCIDHM-EH-2015-NakamuraKKMK #development #self #student #using
Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhengBISEL #behaviour #monitoring #using
Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
HCIDHM-HM-2015-FurukawaTKG #evaluation #image #using
Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
HCIDHM-HM-2015-IkenoboWSG #difference #how
Differences in How Long an Ikebana Work Lasts Depending on the Skill Used in Cutting Floral Materials (YI, ZW, YS, AG), pp. 74–82.
HCIDUXU-DD-2015-AsthanaS #modelling #named #testing #usability #using #xml
Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
HCIDUXU-DD-2015-MichailidouHL #how
How to Evaluate Use Scenarios and Stories (IM, CH, UL), pp. 609–620.
HCIDUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media
Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
HCIDUXU-IXD-2015-DasBRD #co-evolution #design #generative
The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
HCIDUXU-IXD-2015-HalbeyKZ
Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-SchwartzK #challenge #design
The Challenges and Opportunities of Designing National Digital Services for Cross-Border Use (MS, HK), pp. 104–115.
HCIDUXU-UI-2015-AyanogluBTD #artificial reality #case study #using
Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
HCIDUXU-UI-2015-DuWDXJ #case study #metric #using
Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
HCIDUXU-UI-2015-EshetB #design #development #mobile
Approaching Users and Context of Use in the Design and Development of Mobile Systems (EE, HB), pp. 508–519.
HCIDUXU-UI-2015-LiHF #quality #requirements #scalability #user interface #using
Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCIHCI-DE-2015-Hensely-Schinkinger #design
The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCIHCI-DE-2015-Kurosu #quality #usability
Usability, Quality in Use and the Model of Quality Characteristics (MK), pp. 227–237.
HCIHCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #using #visualisation
Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCIHCI-DE-2015-SantosST #interactive #open source #using #visualisation
Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCIHCI-DE-2015-SchutzSO #using
Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCIHCI-DE-2015-SugiuraSO #implementation #metric #security #using
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCIHCI-DE-2015-WatsonS #assessment #using
Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCIHCI-IT-2015-BandeiraCXK #gesture #interface #using
Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCIHCI-IT-2015-FukumotoTE #detection #using
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-IT-2015-GuXCZ #using
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HakodaKSST #bound #gesture #mobile #named #using
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCIHCI-IT-2015-KondoTT #communication #smarttech #using
Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCIHCI-IT-2015-KuribaraST #using
Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCIHCI-IT-2015-MullerLBSKSW #bibliography #data-driven #network #predict #using
Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCIHCI-IT-2015-MurataM #analysis #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-Nagaraju #framework #gesture #using
Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCIHCI-UC-2015-AzhariF #approach #experience #social #social media #user interface #using
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-ClarkeBK #experience #question #using #what
What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCIHCI-UC-2015-OhJK #approach #human-computer #simulation #using
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHCI-UC-2015-SpeiginerMBRLLB #artificial reality #evolution #framework #web
The Evolution of the Argon Web Framework Through Its Use Creating Cultural Heritage and Community-Based Augmented Reality Applications (GS, BM, JDB, HR, AJL, LML, LDB, MG, MS, BD, ME, RJC, EDM), pp. 112–124.
HCIHCI-UC-2015-Ujita #analysis #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-FilhoHTJM #smarttech #using
Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-ItaiM #development #interactive #using
Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HCIHIMI-IKC-2015-KajitaTMI #3d #design #using
Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-MayerBPGV #automation #generative #process #using #visualisation
Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HCIHIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation #using
A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking #using
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-TogawaK #collaboration #framework #using
Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HCIHIMI-IKC-2015-UeokaK #interactive #using
Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HCIHIMI-IKC-2015-UjitokoH #interface #using
Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HCIHIMI-IKD-2015-AraiOM #using #web
A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HCIHIMI-IKD-2015-ChouSW #case study #quality #using
Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HCIHIMI-IKD-2015-ItouNM #information management #twitter #using
Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HCIHIMI-IKD-2015-IwamotoH #induction #using
Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HCIHIMI-IKD-2015-JungLB #multi #question
Voice Control System and Multiplatform Use: Specialist Vs. Generalist? (SJ, KML, FB), pp. 607–616.
HCIHIMI-IKD-2015-KalkattawiN #ubiquitous #using
Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HCIHIMI-IKD-2015-KastratiIY #classification #documentation #framework #using
A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HCIHIMI-IKD-2015-KotaniIAS #interface #using #variability
Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HCIHIMI-IKD-2015-MatsunoAIMM #using
Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HCIHIMI-IKD-2015-MorizumiA #analysis #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HCIHIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour #using
Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HCIHIMI-IKD-2015-WinterSTMCSVS #learning #question #student
Learning to Manage NextGen Environments: Do Student Controllers Prefer to Use Datalink or Voice? (AW, JS, YT, AM, SC, KS, KPLV, TZS), pp. 661–667.
HCIHIMI-IKD-2015-YoshinoO #using
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
HCILCT-2015-BoonbrahmKB #artificial reality #learning #student #using
Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
HCILCT-2015-DalipiYK #analysis #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCILCT-2015-HiramatsuIISS #case study #communication #mobile #using
A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
HCILCT-2015-IbanezN #design #implementation #multi #using
Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
HCILCT-2015-PyperLWJ #mobile #personalisation
The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
HCILCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous #using
Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
HCILCT-2015-SebilloTVPG #artificial reality #interface
The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
HCILCT-2015-Sein-EchaluceBG #education #information management #social #using
A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
HCISCSM-2015-BeldadK #facebook #risk management
It’s Not About the Risks, I’m just Used to Doing It: Disclosure of Personal Information on Facebook Among Adolescent Dutch Users (ADB, RK), pp. 185–195.
HCISCSM-2015-HongK #interactive #online #social #social media
Are Social Media Useful for Managing Reputation Online?: Comparing User Interactions Online with Reputation Indicators (JYJH, JHK), pp. 207–215.
HCISCSM-2015-KastratiIYD #analysis #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-ManssourSSFS #image #network #social #using #visualisation
Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
CAiSECAiSE-2015-Francescomarino #using #workflow
Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSECAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability #using
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEISICEIS-v1-2015-BorgesDRAS #approach #generative #using
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-BouakkazLO #distance #named #similarity #using
GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-Marques-LucenaA #framework #information management #using
Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEISICEIS-v1-2015-MpindaMSR #database #graph #simulation #using
Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEISICEIS-v1-2015-RezendeJ #concurrent #process #using #workflow
Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEISICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation #using
Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEISICEIS-v1-2015-SarmentoCG #network #streaming #using
Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEISICEIS-v1-2015-VaroneA #multi #using
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v2-2015-AizebojeP #approach #pointer #using
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #using #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process #using
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEISICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #using #web
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEISICEIS-v2-2015-KamalKVB #performance
Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEISICEIS-v2-2015-MagnavitaNM #evolution #using
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEISICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEISICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #using #visualisation
VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEISICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml #using
Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing #using
Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-NyameB #information management
The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEISICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process #using
BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEISICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling #using
An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
ICEISICEIS-v3-2015-ValentimCM #analysis #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-ChongDL #modelling #predict #topic #using
Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIRECIR-2015-Dutta #approximate #mining #named #statistics #string #using
MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIRECIR-2015-GogMP #identification #on the #statistics #using
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIRECIR-2015-HagenPBS #classification #detection #sentiment #twitter #using
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-JameelLB #modelling #parametricity #topic #using
Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIRECIR-2015-LiC #effectiveness #using
Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIRECIR-2015-LimCLK #community #constraints #detection #using
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-LuoZDY #design #using
Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIRECIR-2015-MaddalenaMST #estimation #using
Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICMLICML-2015-AvronH #community #detection #personalisation #rank #using
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #detection #semantics #using
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-LeC #learning #metric #using
Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICMLICML-2015-SnoekRSKSSPPA #network #optimisation #scalability #using
Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICMLICML-2015-Sohl-DicksteinW #learning #using
Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICMLICML-2015-SrivastavaMS #learning #using #video
Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICMLICML-2015-SunQW #optimisation #taxonomy #using
Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank #using
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-ZhuE #approach #hybrid #probability #random #using
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-AhnKLRW #distributed #matrix #probability #scalability #using
Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDDKDD-2015-FuLPXGZZ #modelling #ranking
Real Estate Ranking via Mixed Land-use Latent Models (YF, GL, SP, HX, YG, HZ, CZ), pp. 299–308.
KDDKDD-2015-GleichM #algorithm #graph #learning #using
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-IkonomovskaJD #predict #realtime #using
Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDDKDD-2015-JohanssonD #geometry #graph #learning #similarity #using
Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDDKDD-2015-KotziasDFS #using
From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDDKDD-2015-MayaMMAY #clustering #using
Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDDKDD-2015-MomtazpourZRSR #cyber-physical #invariant #using
Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDDKDD-2015-Ojjeh #open source #realtime #using
Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDDKDD-2015-PengKLC #approximate #clustering #rank #using
Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDDKDD-2015-SethiYRVR #classification #machine learning #scalability #using
Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDDKDD-2015-ShanahanD #distributed #scalability #using
Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDDKDD-2015-SomanchiALEG #predict #using
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDDKDD-2015-WangYLXXCR #predict #using
Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDDKDD-2015-WeiLMCRS #predict #using
Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDDKDD-2015-YuanBM #process #re-engineering #using
Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDDKDD-2015-ZhengYX #composition #linear #modelling #topic #using
Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDMMLDM-2015-Babu #classification #identification #using
Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDMMLDM-2015-CostaFK #multi #using
Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDMMLDM-2015-GovadaJMS #approach #hybrid #induction #learning #using
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-MoldovanM #data mining #learning #mining #performance #using
Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDMMLDM-2015-PatchalaBG #email #using
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDMMLDM-2015-TreechalongRW #clustering #using
Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSysRecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation #using
Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSysRecSys-2015-AharonAADGS #named #recommendation
ExcUseMe: Asking Users to Help in Item Cold-Start Recommendations (MA, OA, NAE, DDC, SG, OS), pp. 83–90.
RecSysRecSys-2015-BanksRS #game studies #recommendation #using
The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSysRecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social #using
A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSysRecSys-2015-MagnusonDM #process #recommendation #twitter #using
Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
RecSysRecSys-2015-MarinhoTP #algorithm #question #recommendation
Are Real-World Place Recommender Algorithms Useful in Virtual World Environments? (LBM, CT, DP), pp. 245–248.
SEKESEKE-2015-CaoHH #design #evaluation #quality #using
Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKESEKE-2015-CavalcanteRC #experience #named #user interface
MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
SEKESEKE-2015-ChavezM #information retrieval #ontology #query #using
An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKESEKE-2015-DingZ #modelling #petri net #using
Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKESEKE-2015-GoswamiWS #learning #performance #using
Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKESEKE-2015-ManiPW #co-evolution #modelling #performance #using
Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based #using
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NetoSZD #network #using
Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards #using
Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKESEKE-2015-Tasse #analysis #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TrinkenreichSCS #metric #process #towards #using
Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKESEKE-2015-TunnellA #fault #modelling #predict #release planning #using
Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKESEKE-2015-WuCZX #c++ #developer #empirical #how #library
How do developers use C++ libraries? An empirical study (DW, LC, YZ, BX), pp. 260–265.
SEKESEKE-2015-XuB #multi #reliability #using
A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIRSIGIR-2015-AlbakourMO #data type #identification #metadata #topic #using
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial #using
Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIRSIGIR-2015-CapraACV #complexity #difference
Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIRSIGIR-2015-Kiseleva #behaviour #information management #using
Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIRSIGIR-2015-LiLZS #matrix #modelling #multi #retrieval #using
Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIRSIGIR-2015-LiuAH #information retrieval #probability #using
Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIRSIGIR-2015-Lu #statistics #using
Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIRSIGIR-2015-MehrotraY #learning #query #rank #using
Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIRSIGIR-2015-Mitra #distributed #query #using
Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIRSIGIR-2015-NovakBZ #image #retrieval #scalability #using
Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIRSIGIR-2015-ParkC #concept #retrieval #using
Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIRSIGIR-2015-WeiG #summary #twitter #using
Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIRSIGIR-2015-YaoSQWSH #recommendation #social #using
Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
ECMFAECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism #using
Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMTAMT-2015-HilkenBGV #development #modelling #using
Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
MoDELSMoDELS-2015-Fernandez-SaezC #bibliography #documentation #industrial #maintenance #on the #uml
On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELSMoDELS-2015-HajriGBS #approach #case study #embedded #industrial #lessons learnt #modelling #product line
Applying product line Use case modeling in an industrial automotive embedded system: Lessons learned and a refined approach (IH, AG, LCB, TS), pp. 338–347.
MoDELSMoDELS-2015-LuddeckeSSS #modelling #network #using
Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELSMoDELS-2015-NguyenGA #case study #requirements
Integrating goal-oriented and use case-based requirements engineering: The missing link (THN, JCG, MA), pp. 328–337.
MoDELSMoDELS-2015-RagoMD #case study #identification #semantics
Identifying duplicate functionality in textual use cases by aligning semantic actions (SoSyM abstract) (AR, CM, JADP), p. 446.
MoDELSMoDELS-2015-SongLASDC #architecture #formal method #probability #using #verification
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract) (SS, YL, MA, JS, JSD, TC), p. 449.
MoDELSMoDELS-2015-StephanC #clone detection #detection #identification #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
MoDELSMoDELS-2015-ValentimROCM #case study #empirical #specification #usability
A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques (NMCV, JR, ACO, TC, SM), pp. 206–215.
OnwardOnward-2015-CitoLGDKR #developer #feedback #metric #runtime #using
Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLAOOPSLA-2015-MastrangeloPMLH #api #java
Use at your own risk: the Java unsafe API in the wild (LM, LP, AM, ML, MH, NN), pp. 695–710.
OOPSLAOOPSLA-2015-VoelterDKE #c #case study #embedded #using
Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
GPCEGPCE-2015-InostrozaS #algebra #composition #using
Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCEGPCE-2015-SeidlSS #design pattern #development #generative #product line #using #variability
Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
PPDPPPDP-2015-RondogiannisT #logic programming #using
Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
PADLPADL-2015-BassedaK #logic #transaction #using
State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
POPLPOPL-2015-BastaniAA #context-free grammar #reachability #specification #using
Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
SACSAC-2015-BolockA #automation #constraints #generative #towards #using
Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SACSAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse #using
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-ByunC #automation #constraints #operating system #safety #testing #using
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SACSAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social #using
Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SACSAC-2015-ChaudhuriMG #network #predict #using
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SACSAC-2015-CorcoglionitiRM #rdf #sorting #streaming #using
Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SACSAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SACSAC-2015-DabainMT #design pattern #detection #using
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-DarabiG #personalisation #summary #using #video
Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SACSAC-2015-DasK #using
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SACSAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring #using
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-HamataniUH #smarttech #using
Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-HublerRFS #data flow #named #using
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SACSAC-2015-JeongYAYP #algorithm #interactive #network #search-based #using
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SACSAC-2015-Jo #algorithm #image #interactive #search-based #using
Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SACSAC-2015-JuniorL #case study #named #reuse #specification
M-4REuse: reusing use cases specifications (MMCJ, ML), pp. 1390–1396.
SACSAC-2015-KaplanisKSMT
HB+tree: use hadoop and HBase even your data isn’t that big (AK, MK, SS, CM, GT), pp. 973–980.
SACSAC-2015-KimK #scalability #using
Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SACSAC-2015-KimL #diagrams #qvt #sequence chart #using
Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LeTN #requirements #using #verification
Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SACSAC-2015-LiuI #clustering #framework #optimisation #parallel #using
An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SACSAC-2015-MainiS #communication #distributed #multi #using
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SACSAC-2015-MeftehBB #approach #case study #diagrams #evaluation #feature model #implementation #modelling #uml
Implementation and evaluation of an approach for extracting feature models from documented UML use case diagrams (MM, NB, HBA), pp. 1602–1609.
SACSAC-2015-MottaMSMPC #3d #image #re-engineering
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
SACSAC-2015-OliveiraQMM #community #complexity #detection #using
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-PintoMCS #process #using
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SACSAC-2015-Rekha #big data #detection #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance #using
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SACSAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-RodriguesJD #recommendation #using
Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SACSAC-2015-SilvaBAR #clustering #multi #prototype #using
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SACSAC-2015-SilvaMR #algorithm #approach #problem #using
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-SilvaSBVS #assessment #framework #process #using
Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SACSAC-2015-SioutisSC #composition #graph #on the #reasoning
On the use and effect of graph decomposition in qualitative spatial and temporal reasoning (MS, YS, JFC), pp. 1874–1879.
SACSAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability #using
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SACSAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SACSAC-2015-XuanLXT #empirical #fault #metric #predict #set #using
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SACSAC-2015-XuYYHHK #multi #predict #using
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
ESEC-FSEESEC-FSE-2015-HammoudiBBR #debugging #on the #web
On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code #using
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-NguyenGA #case study #modelling #rule-based
Rule-based extraction of goal-use case models from text (THN, JCG, MA), pp. 591–601.
ESEC-FSEESEC-FSE-2015-NorthBSC #developer #named #using
GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSEESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation #using
MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSEESEC-FSE-2015-WangPGBI #automation #case study #named #specification #testing #tool support
UMTG: a toolset to automatically generate system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 942–945.
ESEC-FSEESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing #using
Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSEESEC-FSE-2015-XuKB #ubiquitous #using
Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-CasalnuovoDOFR #git
Assert Use in GitHub Projects (CC, PTD, AO, VF, BR), pp. 755–766.
ICSEICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing #using
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSEICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source #using
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSEICSE-v1-2015-MorenoBPOM #how #question
How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSEICSE-v1-2015-PetrosyanRM #api #classification #information management #using
Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSEICSE-v1-2015-YangXALXE #behaviour #mobile #named #using
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSEICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named #using
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSEICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval
The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSEICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #using #video
scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSEICSE-v2-2015-CamilloniVA #evaluation #re-engineering #using
Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSEICSE-v2-2015-Cornu #debugging #named #null #using
Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSEICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library #using
Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSEICSE-v2-2015-GveroK #interactive #query #synthesis #using
Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSEICSE-v2-2015-HerzigN #detection #empirical #using
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-LutellierCGTRMK #architecture #dependence #using
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering #using
Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SLESLE-2015-GammaitoniKG #design #using
Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLESLE-2015-OchoaRT #feature model #modelling #using
Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
SPLCSPLC-2015-BeekFGM #analysis #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeucheH #lifecycle #product line #using
Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLCSPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi #using
Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLCSPLC-2015-DimovskiABW #model checking #off the shelf #using
Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-DudderRH #composition #design #staged #type safety #using
Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLCSPLC-2015-PatelS #as a service #automation #testing #using #variability
Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
ASPLOSASPLOS-2015-OrrCYBHW #using
Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOSASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer #using
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOSASPLOS-2015-TanQCAP #named #network #using
DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-StepanovS #c++ #detection #memory management #named #performance
MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
HPCAHPCA-2015-HungerKRDVT #comprehension #using
Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCAHPCA-2015-LoCIS #monitoring #runtime #using
Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCAHPCA-2015-WuGLJC #estimation #machine learning #performance #using
GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDCHPDC-2015-HeSSI #cost analysis #online #using
Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMMISMM-2015-OsterlundL #concurrent #protocol #using
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
LCTESLCTES-2015-BardizbanyanSWL #data access #performance #using
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PPoPPPPoPP-2015-RamachandranM #concurrent #named #performance #using
CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSPSOSP-2015-ChenZCCKZ #file system #hoare #logic #using
Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSPSOSP-2015-RaychevMM #execution #symbolic computation #using
Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSPSOSP-2015-WeiSCCC #in memory #performance #transaction #using
Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
CADECADE-2015-GransdenWR #automaton #named #proving #using
SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADECADE-2015-MaricJM #correctness #higher-order #proving #using
Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADECADE-2015-Paulson #automaton #finite #formal method #set #using
A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADECADE-2015-TiwariGD #synthesis #using
Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAVCAV-2015-BacchusK #satisfiability #set #using
Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAVCAV-2015-CernyCHRRST #scheduling #synthesis #using
From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAVCAV-2015-DeshmukhMP #consistency #metric #using
Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAVCAV-2015-ErezN #automation #bound #graph #smt #using
Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLPICLP-2015-Charwat #diagrams #programming #research #summary #using
Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC).
ICLPICLP-2015-LeeWZ #automation #programming #reasoning #set #using
Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ).
ICLPICLP-2015-LiVPSB #debugging #using
Debugging ASP using ILP (TL, MDV, JP, KS, TB).
ICLPICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code #using
Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLPICLP-J-2015-KoponenOJS #optimisation #programming #set #using
Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICSTICST-2015-0001YPGS #analysis #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-BaiSP #fault #named #using
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICSTICST-2015-Felbinger #assessment #model inference #quality #testing #using
Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICSTICST-2015-LeottaSRT #multi #robust #testing #using #web
Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICSTICST-2015-MahajanH #detection #html #locality #using
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-NoguchiWFSO #black box #optimisation #testing #using
History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICSTICST-2015-PouldingF #generative #testing
Re-Using Generators of Complex Test Data (SMP, RF), pp. 1–10.
ICSTICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml #using
Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICSTICST-2015-SantosC #agile #challenge #industrial #mobile #testing #using
Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICSTICST-2015-ZhangAC #exclamation #model checking #verification
Yes! You Can Use Your Model Checker to Verify OSEK/VDX Applications (HZ, TA, YC), pp. 1–10.
ISSTAISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based #using
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ISSTAISSTA-2015-WangPGBI #automation #case study #generative #specification #testing
Automatic generation of system test cases from use case specifications (CW, FP, AG, LCB, MZZI), pp. 385–396.
ISSTAISSTA-2015-WangPO #fault #locality
Evaluating the usefulness of IR-based fault localization techniques (QW, CP, AO), pp. 1–11.
LICSLICS-2015-AccattoliC #on the
On the Relative Usefulness of Fireballs (BA, CSC), pp. 141–155.
RTARTA-2015-AvanziniST #certification #complexity #proving #using
Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
ICSTSAT-2015-AnsoteguiGLS #community #detection #using
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAPTAP-2015-AthanasiouLS #concurrent #generative #testing #using
Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAIVMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing #using
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAIVMCAI-2015-NagarS #analysis #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSECBSE-2014-BenedittoW #configuration management #runtime #using
Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSECBSE-2014-MateescuSY #model checking #parallel #process #using
Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #policy #using
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSAQoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance #using
Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSAQoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution #using
Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
ASEASE-2014-Borg #debugging #re-engineering #using
Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise #using
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-DeweyRH #constraints #fuzzing #logic programming #using
Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASEASE-2014-DingesA #execution #generative #using
Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASEASE-2014-HamidiAL #adaptation #using
Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASEASE-2014-LiuSLZWDW #automation #case study #detection #documentation #fault
Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
ASEASE-2014-LutzD #comparison #data flow #difference #interactive #programming #using #visual notation
Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASEASE-2014-MaezawaNWH #ajax #using #validation
Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASEASE-2014-MahajanH #comparison #html #image #using
Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASEASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing #using
MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASEASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring #using
Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASEASE-2014-OsterlundL #component #concurrent #using
Concurrent transformation components using contention context sensors (, WL), pp. 223–234.
ASEASE-2014-RajanSSK #execution #using
Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASEASE-2014-RanganathVG #comparison #testing #using
Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASEASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management #using
Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
CASECASE-2014-ChenLL #adaptation #design #predict #using
Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASECASE-2014-ChenS #approach #markov #modelling #novel #using
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-FeyzabadiC #markov #process #using
Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASECASE-2014-GaoLWA #monitoring #petri net #problem #sequence #using
A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASECASE-2014-GlorieuxDSL #approach #optimisation #using
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HsiehHP #generative #predict #using
Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASECASE-2014-HuCLY #approach #automation #comparative #petri net #using
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-KernWGBM #estimation #machine learning #using
COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASECASE-2014-LeePP #locality #using
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LinHC #gesture #network #recognition #using
Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASECASE-2014-LinWF #using
Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASECASE-2014-LiWC #using
Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASECASE-2014-MahlerKLSMKPWFAG #learning #process #using
Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASECASE-2014-MalinowskiCZ #estimation
Shapelet-based remaining useful life estimation (SM, BCM, NZ), pp. 794–799.
CASECASE-2014-NagataO #approach #multi #using
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-ParkLH #generative #performance #using
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-WahrburgZMD #assembly #estimation #using
Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
DACDAC-2014-AdirGGS #generative #network #testing #using
Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-ChangJC #configuration management #functional #using
Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DACDAC-2014-GebalaMMRT #on the #using
On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DACDAC-2014-KhosraviRGT #multi #optimisation #reliability #using
Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DACDAC-2014-LiuCTKD #component #realtime #using
Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DACDAC-2014-LiuFC #process #self #using
Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DACDAC-2014-LuCCSHTC #named #using
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-MaoWZCL #architecture #memory management #using
Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DACDAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art #using
Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DACDAC-2014-PrussKE #abstraction #equivalence #scalability #using #verification
Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DACDAC-2014-QuintonBHNNE #analysis #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RenMRZ #fault tolerance #network #using
Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DACDAC-2014-RoyKCBC #streaming #using
Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DACDAC-2014-StoermerT #functional #interface #mockup #standard #using
Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DACDAC-2014-TsaiCYYHCCC #energy #using
Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DACDAC-2014-VaidyanathanDP #detection #reliability #stack #using
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-WeiWNP #physics #reverse engineering #using
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DACDAC-2014-YuSHEAB #metric #parametricity #using
Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATEDATE-2014-AhariAKT #architecture #configuration management #power management #using
A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATEDATE-2014-AlaghiH #performance #probability #using
Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing #using
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-Braak #adaptation #embedded #scalability #using
Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATEDATE-2014-CannellaBS #approach #realtime #scheduling #streaming #using
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-CasparLH #automation #strict #testing #using
Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATEDATE-2014-ConosMDP #coordination #energy #power management #using
Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATEDATE-2014-DoanJP #flexibility #implementation #multi #scalability #using
Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis #using
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-FriedlerKMNS #effectiveness #locality #slicing #using
Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATEDATE-2014-KamalGAP #approximate #performance #using
Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATEDATE-2014-LagraaTP #data mining #mining #scalability #simulation #using
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATEDATE-2014-LeeA #architecture #hybrid #novel #power management #using
A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATEDATE-2014-MahmoodPM #performance #reduction #using
Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATEDATE-2014-MarianiPZS #design #named #predict #scheduling #simulation #using
DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATEDATE-2014-MoralesHBHV #energy #implementation #using
Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATEDATE-2014-NarayananDCCLW #using #video
Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATEDATE-2014-ReimerSSB #using
Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATEDATE-2014-Sadri0WWB #3d #energy #optimisation #using
Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATEDATE-2014-SarafBLR #probability #using
IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATEDATE-2014-ShinPM #architecture #hybrid #using
Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATEDATE-2014-TurkyilmazCRBC #3d #integration #using
3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATEDATE-2014-VartziotisKCPJ #multi #optimisation #using
Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-YangMPOP #logic #using
Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATEDATE-2014-ZangenehJ #design #feedback #logic #using
Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
DocEngDocEng-2014-Fan0N #using
Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEngDocEng-2014-Lynch #evolution
The evolving scholarly record: new uses and new forms (CAL), pp. 1–2.
DocEngDocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #using #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEngDocEng-2014-SouzaMH #metadata #named #using
ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRRDRR-2014-BanerjeeC #locality #using #video
Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRRDRR-2014-JainOD #documentation #image #retrieval #scalability #using
Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRRDRR-2014-KleberDS #classification #retrieval #using #word
Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRRDRR-2014-LemaitreCC #image #segmentation #using
Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRRDRR-2014-ParkerFF #documentation #heuristic #image #robust #using
Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRRDRR-2014-TaoTX #documentation #learning #random #using
Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HTHT-2014-AbbasiTL #learning #scalability #using
Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HTHT-2014-NoorianMV #adaptation #feedback #self #using
Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
SIGMODSIGMOD-2014-DyresonBG #query #using
Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMODSIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters #using
SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off #using
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMODSIGMOD-2014-KalininCZ #data analysis #interactive #semantics #using
Interactive data exploration using semantic windows (AK, , SBZ), pp. 505–516.
SIGMODSIGMOD-2014-LevinK #network #pipes and filters #social #using
Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMODSIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation #using
Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDBVLDB-2014-FuOPZ #component #declarative #javascript #named #using
FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDBVLDB-2014-SarmaHC #clustering #framework #named #similarity #using
ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDBVLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability #using
Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDBVLDB-2014-YangDCC #keyword #knowledge base #using
Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDBVLDB-2014-YuMS #random #using
Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDBVLDB-2014-ZhangJSR #big data #recommendation #using
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDBVLDB-2015-Li0QYZ014 #query #set #using
Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDBVLDB-2015-WangZZLW14 #correlation #estimation #streaming #using
Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDBVLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability #using
MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEETCSEET-2014-AkpolatS #gamification #programming #re-engineering #student #using
Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEETCSEET-2014-Lethbridge #development #education #effectiveness #modelling #using
Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEETCSEET-2014-SedelmaierL #modelling #process #requirements #using
Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEETCSEET-2014-ShankararamanD #challenge #design #education #re-engineering #using
Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSEITiCSE-2014-BenottiMS #student #using
Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-GibsonM #collaboration #tool support
A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSEITiCSE-2014-Kann #using
Using reflections in a program integrating course (VK), p. 350.
ITiCSEITiCSE-2014-MedinaSGG #learning #student #using
Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSEITiCSE-2014-MI14a #principle #problem #using
Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSEITiCSE-2014-StrieweG14a #runtime #using
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ESOPESOP-2014-MatosGR #fault #named #using
REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOPESOP-2014-PercontiA #compilation #multi #semantics #using #verification
Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASEFASE-2014-AnjorinSLS #graph grammar #refinement #using
Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASEFASE-2014-MasciZJCT #user interface #using #verification
Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-StruberRTC #crawling #information retrieval #modelling #using
Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic #using
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-SalemDKT #automaton #invariant #model checking #testing #using
Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACASTACAS-2014-WijsB #manycore #named #on the fly #using
GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLAWRLA-2014-BaeM #infinity #model checking #using
Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
SANERCSMR-WCRE-2014-Grosjean #biology #maintenance #using
Using biology and ecology as inspiration for software maintenance? (Keynote abstract) (PG), p. 1.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
SANERCSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support #using
Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-KulkarniM #framework #obfuscation #using
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPCICPC-2014-ThungLOC #classification #design #diagrams #metric #network #using
Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSMEICSME-2014-EddyK #code search #query #source code #using
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-EderFHJ #question
Which Features Do My Users (Not) Use? (SE, HF, BH, MJ), pp. 446–450.
ICSMEICSME-2014-MorenoTMS #debugging #locality #on the #stack
On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSMEICSME-2014-Reiss #code search #testing #towards #using
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based #using
Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSMEICSME-2014-ShangNHJ #comprehension #development #using
Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-StevensR #query #using
Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSMEICSME-2014-VieiraFC #embedded #maintenance #metric #performance #using
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSMEICSME-2014-WangG #design #recommendation #refactoring #using
Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSMEICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #using #visualisation
Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSRMSR-2014-FukushimaKMYU #empirical #fault #modelling #predict #using
An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSRMSR-2014-LazarRS #debugging #detection #metric #similarity #using
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring #using
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
PEPMPEPM-J-2013-Simon14 #type inference #using
Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PLDIPLDI-2014-DeVitoRFAH #generative #runtime #using
First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDIPLDI-2014-PekQM #c #data type #logic #proving #using
Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
SASSAS-2014-ChenHTWW #recursion #source code #using #verification
Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
STOCSTOC-2014-SahaiW #encryption #how #obfuscation
How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
FLOPSFLOPS-2014-Bahr #compilation #correctness #graph #proving #using
Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPSFLOPS-2014-Riesco #debugging #declarative #maude #semantics #using
Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
CIAACIAA-2014-AmorimMR #canonical #finite #linear #transducer #using
Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
DLTDLT-2014-ReinhardtY
The Minimum Amount of Useful Space: New Results and New Directions (KR, AY), pp. 315–326.
ICALPICALP-v1-2014-Lampis #approximate #graph #using
Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALPICALP-v1-2014-PrabhakaranSW #using
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FMFM-2014-LakshmiAK #analysis #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-SanatiMM #decidability #guidelines #logic #metric #using
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FMFM-2014-ShanWFZZWQC #using #verification
Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
IFMIFM-2014-BrideKP #constraints #specification #theorem proving #using #verification #workflow
Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFMSEFM-2014-BianculliGK #logic #metric #pipes and filters #using
Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFMSEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction #using
Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFMSEFM-2014-DuboisR #functional #using
Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFMSEFM-2014-HajisheykhiEK #fault #modelling #using
Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFMSEFM-2014-ReicherdtG #matlab #modelling #using #verification
Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
ICFPICFP-2014-Fisher #formal method #using
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
GT-VMTGT-VMT-2014-WangBL #alloy #graph #model transformation #using #verification
Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHICHI-2014-AferganPSJHBCJ #metric #using
Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHICHI-2014-BalataCM #2d #on the #using
On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHICHI-2014-BurkeK #facebook #network #social
Growing closer on facebook: changes in tie strength through social network site use (MB, REK), pp. 4187–4196.
CHICHI-2014-ChiravirakulP #question
Choice overload in search engine use? (PC, SJP), pp. 1285–1294.
CHICHI-2014-DancuFF #navigation #using
Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHICHI-2014-FeinbergCB #database #design #interactive #using
Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHICHI-2014-FritzHMZ #case study #persuasion #process
Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHICHI-2014-GerlingMBMO #game studies #people #persuasion #towards #using
The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHICHI-2014-GoelLAPBHB #interactive #multi #named #using
SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHICHI-2014-GronvallKPR #interface
Causing commotion with a shape-changing bench: experiencing shape-changing interfaces in use (EG, SK, MGP, MKR), pp. 2559–2568.
CHICHI-2014-HachisuF #feedback #interactive #interface #named #using
VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHICHI-2014-HarbachHWS #communication #privacy #security #using
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHICHI-2014-HarpsteadMAM #design #education #game studies #using
Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHICHI-2014-HayashiMH #gesture #identification #using
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHICHI-2014-HeoGL #using
Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHICHI-2014-HongA #modelling #performance #predict #recommendation #user interface
Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHICHI-2014-HuangTTTYCHC #named #using
TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHICHI-2014-HuangYWZLMLZS #named #using
FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHICHI-2014-JuhlinEO #video
Long tail TV revisited: from ordinary camera phone use to pro-am video production (OJ, AE, ), pp. 1325–1334.
CHICHI-2014-KihmGKM #interactive #power management #symmetry #using
Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHICHI-2014-KulshreshthL #3d #gesture
Exploring the usefulness of finger-based 3D gesture menu selection (AK, JJLJ), pp. 1093–1102.
CHICHI-2014-LaseckiWFB #dependence #using
Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHICHI-2014-LiR #online #using
Using annotations in online group chats (NL, MBR), pp. 863–866.
CHICHI-2014-LuFL #gesture #using
Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHICHI-2014-MarananASPSB #design #modelling #using
Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHICHI-2014-MasseyLW #repository
Cloudy forecast: an exploration of the factors underlying shared repository use (CM, TL, SW), pp. 2461–2470.
CHICHI-2014-MorrisSGK #named #smarttech #using
RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHICHI-2014-MottW #lens #using
Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHICHI-2014-NielsenH #case study
Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHICHI-2014-OKaneRB #mobile
Gaining empathy for non-routine mobile device use through autoethnography (AAO, YR, AEB), pp. 987–990.
CHICHI-2014-PasqualW #predict #using
Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHICHI-2014-PedersenSH #scalability #using
Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHICHI-2014-PikeMPSW #protocol #using
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHICHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #using #video
Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHICHI-2014-PuciharCA #visual notation
The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHICHI-2014-SchildLM #3d #behaviour #design #game studies #using #video
Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHICHI-2014-SchwarzXMHH #classification #probability #using
Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHICHI-2014-SerranoEI
Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHICHI-2014-ShklovskiMSB #mobile #privacy
Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.
CHICHI-2014-Smith-ClarkeMC #communication #mobile #network #using
Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHICHI-2014-SoloveyZPRM #performance #using
Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHICHI-2014-SuhPHK #design #evaluation #twitter #using
@BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHICHI-2014-SunDLLG #case study #using
Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHICHI-2014-TanSLC #collaboration #using #visual notation
Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHICHI-2014-TsandilasABB #coordination
Coordination of tilt and touch in one- and two-handed use (TT, CA, AB, DB), pp. 2001–2004.
CHICHI-2014-UzorB #game studies
Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHICHI-2014-WangL #communication #gesture #similarity #using
Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHICHI-2014-WeigelMS #comprehension #how #mobile #people
More than touch: understanding how people use skin as an input surface for mobile computing (MW, VM, JS), pp. 179–188.
CHICHI-2014-WeiMZ #social #using
Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CHICHI-2014-YeMOF #mobile #people #smarttech #visual notation
Current and future mobile and wearable device use by people with visual impairments (HY, MM, UO, LF), pp. 3123–3132.
CHICHI-2014-ZhaoL #comprehension #social #social media
Curation through use: understanding the personal value of social media (XZ, SEL), pp. 2431–2440.
CSCWCSCW-2014-CastilloEPS #lifecycle #online #social #social media #using
Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCWCSCW-2014-ChenHMN #comprehension #social #social media #word
Understanding individuals’ personal values from social media word use (JC, GH, JM, JN), pp. 405–414.
CSCWCSCW-2014-CoetzeeFHH #question
Should your MOOC forum use a reputation system? (DC, AF, MAH, BH), pp. 1176–1187.
CSCWCSCW-2014-DesjardinsNGW #collaboration
Collaboration surrounding beacon use during companion avalanche rescue (AD, CN, SG, RW), pp. 877–887.
CSCWCSCW-2014-FieslerB #online
Remixers’ understandings of fair use online (CF, AB), pp. 1023–1032.
CSCWCSCW-2014-KellyP #case study #collaboration #web
Collaborative web search in context: a study of tool use in everyday tasks (RK, SJP), pp. 807–819.
CSCWCSCW-2014-LiuBRW #social #social media
Enriching the distressing reality: social media use by chinese migrant workers (JL, AB, DWR, VW), pp. 710–721.
CSCWCSCW-2014-LiuJPP #feedback #using #visual notation
Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCWCSCW-2014-MarkGKJ #enterprise #social #social media
Most liked, fewest friends: patterns of enterprise social media use (GM, IG, SKD, MJ), pp. 393–404.
CSCWCSCW-2014-MassimiBWA #community #health #online
Life transitions and online health communities: reflecting on adoption, use, and disengagement (MM, JLB, HOW, OHA), pp. 1491–1501.
CSCWCSCW-2014-Morris #network #social #women
Social networking site use by mothers of young children (MRM), pp. 1272–1282.
CSCWCSCW-2014-NakazatoYSNTH #realtime #using #video
Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCWCSCW-2014-Quinones
Cultivating practice & shepherding technology use: supporting appropriation among unanticipated users (PAQ), pp. 305–318.
CSCWCSCW-2014-XuHB #design #feedback #generative #named #using #visual notation
Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCWCSCW-2014-YueHH #collaboration #modelling #process #using #web
Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
HCIDHM-2014-DuWZHM #evolution #image #using
Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
HCIDHM-2014-HamamuraFYE
Evacuation Support System for Everyday Use in the Aftermath of a Natural Disaster (AH, TF, TY, NE), pp. 600–611.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-Luo #artificial reality #case study #metric #re-engineering #using
Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
HCIDHM-2014-MamessierDO #artificial reality #assessment #online #using
Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
HCIDHM-2014-OkaGTNH #analysis
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-RasoolSPK #image #using
Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
HCIDHM-2014-SantosST #information management #ontology #semantics #using #web
Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
HCIDHM-2014-YoganathanK #using
ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
HCIDUXU-DI-2014-BarrosSF
Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
HCIDUXU-DI-2014-EschrichKKHG #mobile #using
Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
HCIDUXU-DI-2014-SchusterHBRJ #experience #how #using
Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-ItoHN #design #interface #social #using
Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
HCIDUXU-DP-2014-SilvaPS #analysis #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-ELAS-2014-Chunpir0B #comprehension #using
Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
HCIDUXU-ELAS-2014-GeabelJHABA #identification #using
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-ELAS-2014-KamiyaKASNMF #design #using
Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
HCIDUXU-ELAS-2014-MontAlvao #bibliography #health #using
Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
HCIDUXU-ELAS-2014-VilarDRNV #artificial reality #case study #using
A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
HCIDUXU-TMT-2014-AvilaL #usability
Relationship between Elements of the Usability and Emotions Reported after Use: A Mexican Case (ICLÁ, LRPL), pp. 285–295.
HCIDUXU-TMT-2014-Bergamo #experience #prototype #user interface
User Experience Technique in Computer Digital Arts Production: Paper Prototyping Used as Material to Define Intentionality (MLB), pp. 613–621.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability #using
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-JoyceK #development #internet #self
Measuring Confidence in Internet Use: The Development of an Internet Self-efficacy Scale (MJ, JK), pp. 250–260.
HCIDUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface #using
Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCIHCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition #using
The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCIHCI-AIMT-2014-ChakravartyC #artificial reality #identification #using
Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCIHCI-AIMT-2014-KuribaraMOST #named #using
HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCIHCI-AIMT-2014-Man #hardware #using #video
Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCIHCI-AIMT-2014-NiLF #interactive #using
Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCIHCI-AIMT-2014-ReddyC #artificial reality #process #recognition #using
Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCIHCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov #using
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TsurudaHYI #mobile #using
Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCIHCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive #using
“Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCIHCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality #using
Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCIHCI-AS-2014-DotencoGG #smarttech #using
Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCIHCI-AS-2014-KadomuraITRS #named #using #visualisation
AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCIHCI-AS-2014-LeeYJ #predict #using
Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCIHCI-AS-2014-MaguireT #comparison #mobile
Comparison Test of Website Use with Mobile Phone and Laptop Computer (MM, MT), pp. 146–154.
HCIHCI-AS-2014-OgataII #smarttech #using
Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCIHCI-AS-2014-ParkKL #case study #smarttech
A Study of Emoticon Use in Instant Messaging from Smartphone (TWP, SJK, GL), pp. 155–165.
HCIHCI-AS-2014-SatoIN
Tourist Evacuation Guidance Support System for Use in Disasters (TS, TI, YN), pp. 494–501.
HCIHCI-TMT-2014-BrownTBKLMCEGA #design #using
Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCIHCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability #using
ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCIHCI-TMT-2014-HankiewiczB #performance #quality #source code #using #word
Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCIHCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface #using
Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCIHCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net #using
PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCIHCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface #using
Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HCIHIMI-AS-2014-AlkhateebHH #comprehension #using
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-IizukaG #mobile #using
Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HCIHIMI-AS-2014-KangSCL #case study #eye tracking
A Study of Drivers’ Blind Spot in Used of Eye Tracking (YYK, YCS, CCC, CLL), pp. 253–260.
HCIHIMI-AS-2014-MakiY #3d #image #multi #using
3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HCIHIMI-AS-2014-MoorthyV
Voice Activated Personal Assistant: Acceptability of Use in the Public Space (AEM, KPLV), pp. 324–334.
HCIHIMI-AS-2014-TanakaTH #development #education #using
Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HCIHIMI-AS-2014-TogawaK #collaboration #framework #smarttech #using
Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HCIHIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards #using
Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HCIHIMI-DE-2014-ChangT #case study
A Study of the Factors Affecting Product Values and Preferences-Using Vacuum Cleaner as an Example (WcC, HyT), pp. 561–571.
HCIHIMI-DE-2014-HottaOM #user interface #using
Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HCIHIMI-DE-2014-JungAK #interface #using #web
A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HCIHIMI-DE-2014-KatoM #deployment #modelling #quality #using
Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HCIHIMI-DE-2014-KhodaskarL #image #retrieval #semantics #using
Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HCIHIMI-DE-2014-SakaguchiIH #development #performance #using
Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HCIHIMI-DE-2014-SakuraiKNTH #pseudo #using
Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition #using
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining #using
User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HCIHIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support #using
Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
HCIHIMI-DE-2014-ValdezSZH #clustering #network #research #scalability #social #visualisation
Enhancing Interdisciplinary Cooperation by Social Platforms — Assessing the Usefulness of Bibliometric Social Network Visualization in Large-Scale Research Clusters (ACV, AKS, MZ, AH), pp. 298–309.
HCILCT-NLE-2014-NicolaouC
Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
HCILCT-NLE-2014-OrehovackiBJ #education #quality #web
Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
HCILCT-TRE-2014-GoodeC #collaboration #online #performance #predict
Online Collaboration: Individual Involvement Used to Predict Team Performance (AWG, GC), pp. 408–416.
HCILCT-TRE-2014-HafnerHO #artificial reality #physics #using
Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
HCILCT-TRE-2014-HiramatsuIFS #development #learning #using
Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
HCILCT-TRE-2014-SofticVMWE #research #using
Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
HCILCT-TRE-2014-Timotheou
Reflective Thinking: Exploring Blog Use by Adult Learners (MMT), pp. 460–466.
HCILCT-TRE-2014-TzanavariMCP #experience #performance #user interface #using
User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
HCISCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named #using
Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
HCISCSM-2014-AbdallaY #bibliography #network #online #process #social #using
A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
HCISCSM-2014-Ahangama #detection #realtime #social #social media #twitter
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-FardounAG #community #education
Useful Educational Exercises for the Community (HMF, DMA, LCG), pp. 314–321.
HCISCSM-2014-HuangG #empirical #health #network #social #using
Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
HCISCSM-2014-MendesFFC #analysis #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
HCISCSM-2014-OtakeSOSUS #gamification #motivation #using
A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
HCISCSM-2014-PensasVGKKCV #communication #network #social #using
Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
HCISCSM-2014-RayaRRP #adaptation #game studies #using
Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
HCISCSM-2014-SchaarVZELJ #motivation #network #social #using
Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFTVISSOFT-2014-SchotsW #framework #using #visualisation
Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSECAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics #using
Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSECAiSE-2014-PikaWFHLA #behaviour #framework #using
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSECAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval #using
Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSECAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #using #variability
Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSECAiSE-2014-VergneS #community #markov #network #open source #using
Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEISICEIS-v1-2014-CoelhoAABB #network #using
Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEISICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap #using
Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEISICEIS-v1-2014-KleinSRF #formal method #integration #on the #using
On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEISICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based
The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEISICEIS-v1-2014-MamcenkoG #mobile #predict #using
Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEISICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel #using
An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEISICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring #using
Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters #using
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net #using
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation #using
Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEISICEIS-v2-2014-GippMBPN #detection #semantics #similarity #using #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-KaramtiTG #image #network #process #retrieval #using
Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEISICEIS-v2-2014-MeloS #design #modelling #uml #using
Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEISICEIS-v2-2014-OtonBGGB #learning #metadata #using
Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEISICEIS-v2-2014-SilvaMS #aspect-oriented #bibliography #evaluation #performance #programming
A Systematic Review on Performance Evaluation of Aspect-Oriented Programming Techniques used to Implement Crosscutting Concerns (RFGdS, MdAM, MSS), pp. 5–13.
ICEISICEIS-v2-2014-ThommazoRROHWF #traceability #using
Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEISICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy #using
Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEISICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process #using
Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEISICEIS-v3-2014-NunoG #in the cloud #outsourcing #using
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEISICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process #using
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEISICEIS-v3-2014-ZacepinsBA #using
Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKMCIKM-2014-AgrawalGKK #concept #graph #similarity #using
Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKMCIKM-2014-CarmelMPS #analysis #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-DavletovAC #predict #using
High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKMCIKM-2014-FangQHZ #bibliography #composition #ranking #sentiment #summary #using
Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKMCIKM-2014-HanWP #classification #using
Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKMCIKM-2014-HustonC #comparison #dependence #modelling #retrieval #using
A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKMCIKM-2014-LiuLK #classification #information management #performance #using
Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKMCIKM-2014-NguyenTT #crowdsourcing #similarity #using
Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKMCIKM-2014-PfeifferNB #learning #network #probability #using
Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKMCIKM-2014-RahmanH #network #strict #using
Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKMCIKM-2014-RenTOS #how #people #scalability #web
How People Use the Web in Large Indoor Spaces (YR, MT, KO, MS), pp. 1879–1882.
CIKMCIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using
Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKMCIKM-2014-YangLLLH #automation #clustering #detection #multi #social #using
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKMCIKM-2014-ZhuMHZC #social #social media #topic #using
Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIRECIR-2014-Aly #normalisation #parametricity #using
Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIRECIR-2014-GaoWO #comparison #using
Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIRECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #using #video
Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIRECIR-2014-KapteinKVB #semantics #using #web
Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIRECIR-2014-LefortierSRR #case study #using #video #web
Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIRECIR-2014-Lommatzsch #realtime #recommendation #using
Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIRECIR-2014-PanemBGV #detection #realtime #topic #twitter #using
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchuthSWR #case study #optimisation #using
Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIRECIR-2014-YangPSS #case study #e-commerce #query #scalability #using
A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance #using
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics #using
Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICMLICML-c2-2014-ChagantyL #modelling #using #visual notation
Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICMLICML-c2-2014-Chen0 #big data #learning #modelling #topic #using
Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICMLICML-c2-2014-Cherian #nearest neighbour #using
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-GalG #parallel #process
Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICMLICML-c2-2014-JohanssonJDB #geometry #graph #kernel #using
Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICMLICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random #using
A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SchwingHPU #algorithm #convergence #parallel #using
Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-TamarMX #approximate #robust #scalability #using
Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPRICPR-2014-AlathariNB #segmentation #using
Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPRICPR-2014-AlemdarKNME #behaviour #modelling #using
A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPRICPR-2014-AlmogahedK #game studies #named #using
NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPRICPR-2014-AzizWH #graph #kernel #using
Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPRICPR-2014-BashbaghiGSB #multi #using
Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BekhetA #using #video
Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPRICPR-2014-BeraM #multi #realtime #using
Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPRICPR-2014-BicegoRFRG #behaviour #using
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BogunKCR #interactive #recognition #using
Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPRICPR-2014-BorgiLEA14a #multi #recognition #using
Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPRICPR-2014-BrownFP #detection #self #using
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNK #graph #music #using
Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPRICPR-2014-BuiNLYK #detection #order #statistics #using
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-ByeonLB #2d #classification #network #using
Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPRICPR-2014-CaliskanA #using
Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPRICPR-2014-ChanK #geometry #identification #image #using
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPRICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry #using
Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPRICPR-2014-ChenK #gesture #recognition #using
Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPRICPR-2014-ChenLHLLH #detection #using
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenWLHI #image #robust #segmentation #using
Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPRICPR-2014-ChevallierCA #estimation #image #metric #orthogonal #using
Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPRICPR-2014-ChironGM #behaviour #parametricity #using
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-Climent-PerezMR #detection #multi #using
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-DahlCB #image #multi #segmentation #using
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DominguesMMSR #information management #recommendation #topic #using
Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPRICPR-2014-DongPHLDJ #classification #network #using
Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPRICPR-2014-DuanHZCZ #image #segmentation #using
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification #using
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-DuDA #modelling #topic #using
Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPRICPR-2014-DuHZWD #case study #classification #design #network #online #recognition #using
A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPRICPR-2014-ElmikatyS #detection #image #multi #using
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-EvangelidisSH #recognition #using
Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPRICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech #using
Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPRICPR-2014-ForsbergM #image #segmentation
Evaluating Cell Nuclei Segmentation for Use on Whole-Slide Images in Lung Cytology (DF, NM), pp. 3380–3385.
ICPRICPR-2014-GavriilidisT #classification #kernel #random #using
Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPRICPR-2014-GeXYS #image #synthesis #using
Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPRICPR-2014-GhoraiC #algorithm #composition #higher-order #image #using
An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPRICPR-2014-GiordanoPS #estimation #kernel #modelling #using
Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPRICPR-2014-GognaSM #matrix #using
Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPRICPR-2014-Gonzalez-CastroDC #adaptation #classification #using
Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPRICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition #using
Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPRICPR-2014-GuptaBVS #on the #using
On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPRICPR-2014-HafemannOC #network #recognition #using
Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPRICPR-2014-HaoXPSK #automation #semantics #topic #using
Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPRICPR-2014-HaqBBA #modelling #segmentation #using
Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPRICPR-2014-HasnatAT #clustering #image #using
Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPRICPR-2014-HeDY0PJ #multi #random #using #visual notation
Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPRICPR-2014-HuangZPZ #canonical #correlation #recognition #robust #using
Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPRICPR-2014-HusainDT #random #using
Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPRICPR-2014-HuWSC #detection #framework #robust #using
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-HuynhCM #3d #constraints #geometry #using #video
Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPRICPR-2014-IoannidisCL #clustering #modelling #multi #using
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPRICPR-2014-ItohIS #2d #image #linear #using
Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPRICPR-2014-JangLSK #automation #classification #multi #using #video
Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPRICPR-2014-JinIHS #approach #using
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-JoshiGG #automation #predict #using #visual notation
Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPRICPR-2014-JudV #using
Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPRICPR-2014-KacheleZMS #feature model #quality #recognition #using
Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPRICPR-2014-KapsourasN #approach #recognition #using
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KarM #fuzzy #using
Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPRICPR-2014-KeceliC #approach #multimodal #using
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-KimP14a #3d #interactive #physics #using
Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPRICPR-2014-KramarevZWL #categorisation #composition #image #representation #using
Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPRICPR-2014-KuangOA #estimation #using
Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, ), pp. 2419–2423.
ICPRICPR-2014-KumarA2 #stack #using
Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-KurtekS #analysis #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LaiSTH #3d #using
3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPRICPR-2014-LandgrenOH #image #segmentation #using
A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPRICPR-2014-LeeSL #3d #invariant #recognition #self #using
View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPRICPR-2014-LeNVOT #documentation #retrieval #using
Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition #using
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LinH #analysis #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiRPV #modelling #topic #using
Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPRICPR-2014-LuoZW #image #segmentation #using
Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPRICPR-2014-LuYXYWP #recognition #using
Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPRICPR-2014-MaHXP #3d #approach #robust #using
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MatsuoSY #detection #image #using
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MittalKKK #recognition #using
Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPRICPR-2014-MiyanS #consistency #image #using
Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPRICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition #using
Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MolderCCH #automation #detection #reduction #using
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MollerPB #analysis #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKNK #detection #using #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MoyouIP #3d #estimation #performance #retrieval #using
LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPRICPR-2014-MuddamsettySTM #detection #using
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NakashikaHTA #3d #recognition #using
3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPRICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval #using
Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPRICPR-2014-NguyenGVP #framework #parametricity #process #recognition #using
A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPRICPR-2014-NguyenP #linear #multi #using
Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPRICPR-2014-NieJ #learning #linear #using
Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPRICPR-2014-NieKZ #learning #recognition #using
Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPRICPR-2014-Nilsson #polynomial #using
Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPRICPR-2014-NilssonAGF #detection #using
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NishimuraOAN #image #modelling #speech #using #web
Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPRICPR-2014-OhyamaYWK #recognition #using
Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPRICPR-2014-OtteSZ #algorithm #named #using
ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPRICPR-2014-PandaKC #graph #random #scalability #summary #using #video
Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPRICPR-2014-PaudelDHV #2d #3d #locality #using
Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPRICPR-2014-PerinaKB #array #classification #kernel #using
Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPRICPR-2014-QureshiHA #probability #using
A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPRICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #using #video
Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPRICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance #using
Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPRICPR-2014-RazavianASC #smarttech #using
Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPRICPR-2014-RenL #gender #recognition #using
Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPRICPR-2014-RingLRE #assessment #using
A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPRICPR-2014-RosaCJPFT #clustering #network #on the #using
On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPRICPR-2014-SaitoAFRSGC #learning #using
Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPRICPR-2014-SamantaC #classification #using
Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPRICPR-2014-SariE #analysis #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SavakisRP #difference #gesture #learning #using
Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPRICPR-2014-SaygiliMH #metric #similarity #using
Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPRICPR-2014-SeckDT #3d #analysis #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-Shirakawa #multi #performance #similarity #using
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-SlitiHBA #analysis #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-SongLZC #adaptation #performance #using
Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPRICPR-2014-SuLTLT #recognition #using
Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPRICPR-2014-SunTL #online #using
Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPRICPR-2014-TabiaV #3d #classification #using
3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPRICPR-2014-TaniH #detection #robust #using
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TaxSRM #performance #type system
The Effect of Aggregating Subtype Performances Depends Strongly on the Performance Measure Used (DMJT, HMJS, MJTR, PDM), pp. 3720–3725.
ICPRICPR-2014-TegenWHOJMNA #image #segmentation #semantics #using
Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, ), pp. 2281–2286.
ICPRICPR-2014-TerissiPG #classification #random #using
Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPRICPR-2014-VuEIYY #image #using
Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPRICPR-2014-WangCH #hybrid #markov #multi #random #using #video
Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPRICPR-2014-WangGJ #learning #using
Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPRICPR-2014-WangS #automation #dataset #multi #segmentation #using
Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPRICPR-2014-WangWJ14a #markov #modelling #recognition #using
Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPRICPR-2014-WangYLZF #independence #recognition #using
Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPRICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition #using
View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPRICPR-2014-XiaoCJF #recognition #using
Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPRICPR-2014-XuS #learning #network #using
Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPRICPR-2014-YamadaM #approach #behaviour #using
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-YamashitaW #classification #using
k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPRICPR-2014-YangD #identification #novel #using
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPRICPR-2014-YangTL #energy #image #recognition #using
Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPRICPR-2014-YingWMYZ #problem #using
The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPRICPR-2014-YuCK #distance #recognition #set #using
Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPRICPR-2014-YuGZ #3d #recognition #using
Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPRICPR-2014-YuncuHB #automation #modelling #recognition #speech #using
Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhangT #recognition #using #word
Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPRICPR-2014-ZhangWGZZ #analysis #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPRICPR-2014-ZhangWL #using #video
Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDDKDD-2014-GaddeAO #graph #learning #using
Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDDKDD-2014-JinKSDGCPR #community #geometry #modelling #network #social #using
Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDDKDD-2014-QianHJPZ #approach #distance #learning #metric #using
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source #using
“Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDDKDD-2014-SintosT #network #social #using
Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDDKDD-2014-SrikantA #machine learning #programming #using
A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDDKDD-2014-TayebiEGB #embedded #learning #predict #using
Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDDKDD-2014-WangZQZ #using
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-WangZX #estimation #using
Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDDKDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #using #video
Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDDKDD-2014-Yoshida #adaptation #algorithm #linear #sketching #using
Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #using #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-AlahmadiJM #classification #concept #representation #using
Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIRKDIR-2014-BarcanteJDCCS #identification #mining #using
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-BatistaCRF #ambiguity #using #wiki
Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIRKDIR-2014-Bleiweiss #execution #machine learning #using
SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIRKDIR-2014-KudamaL #random #semantics #using
Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIRKDIR-2014-MorenoGV #data mining #mining #recognition #using #word
Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIRKDIR-2014-NagwanshiM #detection #semantics #sentiment #using
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-SatoNS #classification #kernel #using
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEODKEOD-2014-DogduKG #information management #ontology #using
Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEODKEOD-2014-OlszewskaSM #design #ontology #owl #uml #using
Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEODKEOD-2014-TarakciC #recommendation #using
Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMISKMIS-2014-FrancoisMA #communication #design #email #problem #traceability #using
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMISKMIS-2014-Grim-Yefsah #case study #information management #process #requirements #using
A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KRKR-2014-ClercqBSCN #game studies #programming #set #using
Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KRKR-2014-Dyrkolbotn #how #set #using
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition #using
Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDMMLDM-2014-JavedA #classification #dataset #network #social #using
Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-LarinSKKHC #classification #parametricity #representation #using
Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDMMLDM-2014-SandovalH #learning #network #using
Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDMMLDM-2014-SchraagenK #consistency #graph #using
Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSysRecSys-2014-BachrachFGKKNP #recommendation #using
Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSysRecSys-2014-BhagatWIT #learning #matrix #recommendation #using
Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSysRecSys-2014-KellerR #e-commerce #framework #named #recommendation
Cosibon: an E-commerce like platform enabling bricks-and-mortar stores to use sophisticated product recommender systems (TK, MR), pp. 367–368.
RecSysRecSys-2014-LercheJ #feedback #personalisation #ranking #using
Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSysRecSys-2014-LiuGWB #power of #using
Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKESEKE-2014-ChenHQJ #performance #static analysis #using
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process #using
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #using #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-JaliGH #behaviour #case study #generative #ontology
Behavioral Model Generation from Use Cases Based on Ontology Mapping and GRASP Patterns (NJ, DG, PH), pp. 324–329.
SEKESEKE-2014-JiangCKZD #model transformation #source code #testing #using
Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKESEKE-2014-KaurKF #low cost #mining #using #web
Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKESEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named #using
CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKESEKE-2014-ParkSHSHB #algorithm #resource management #search-based #using
Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis #using
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-SinghS #machine learning #requirements #using
Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKESEKE-2014-SouzaRS #empirical #predict #using
A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKESEKE-2014-TianWHZG #feedback #recommendation #using #web #web service
Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKESEKE-2014-Wang #composition #using #web #web service
QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKESEKE-2014-WangGZ #network #predict #using
Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKESEKE-2014-XuL #approach #architecture #automation #synthesis #using
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKESEKE-2014-XuL14a #ontology #reasoning #semantics #using
Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIRSIGIR-2014-AnilSS #evolution #kernel #modelling #network #social #using
Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIRSIGIR-2014-CeroniTKN #using
Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIRSIGIR-2014-DaltonDA #knowledge base #query #using
Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIRSIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation #using
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIRSIGIR-2014-Ifada #modelling #personalisation #recommendation #topic #using
A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIRSIGIR-2014-KeikhaPC #metric #summary #using
Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIRSIGIR-2014-KharazmiSSV #difference #using
Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIRSIGIR-2014-KumarJF #detection #twitter #using
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-LeeTC #behaviour #multi #risk management
Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
SIGIRSIGIR-2014-LivneGTDA #difference #named #recommendation #using
CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIRSIGIR-2014-RoitmanHK #using
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIRSIGIR-2014-RoyVGC #query #segmentation #sequence #using
Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIRSIGIR-2014-Sebastian #clustering #predict #semantics #using
Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIRSIGIR-2014-WangariZA #case study #interface #multimodal
Discovering real-world use cases for a multimodal math search interface (KDVW, RZ, AA), pp. 947–950.
SIGIRSIGIR-2014-WuKS #behaviour #online #using
Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKYSKY-2014-Ben-Av #algebra #generative #multi #ontology #using
Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy #using
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards #using
Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-ReggioLR #bibliography #uml #what
Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-ReggioLR #bibliography #uml #what
Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
ECOOPECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #using #virtual machine
Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
ECOOPECOOP-2014-MayerS #automation #domain-specific language #framework #java #multi #refactoring
Automated Multi-Language Artifact Binding and Rename Refactoring between Java and DSLs Used by Java Frameworks (PM, AS), pp. 437–462.
ECOOPECOOP-2014-NittaKT #framework #identification
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
OnwardOnward-2014-TaeumelPSLH #data-driven #development
Interleaving of Modification and Use in Data-driven Tool Development (MT, MP, BS, JL, RH), pp. 185–200.
OOPSLAOOPSLA-2014-Desai0M #proving #reduction #source code #using
Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-VoraKG #algorithm #consistency #named #parallel #using
ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PLATEAUPLATEAU-2014-SadowskiY #concurrent #detection #developer #how #tool support
How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
GPCEGPCE-2014-Asai #compilation #using
Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
PPDPPPDP-2014-Schopp #low level #source code #using
Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPLQAPL-2014-Feng #distributed #hybrid #modelling #probability #using
Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
PADLPADL-2014-CampeottoPDFP #constraints #theorem proving
Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADLPADL-2014-LakinP #compilation #functional #programming language #using
Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
POPLPOPL-2014-ChaudhuriCS #proving #synthesis #using
Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
RERE-2014-AntonelliRLO #using
Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-PorterLS #case study #experience #feedback #framework #requirements #using
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RERE-2014-SlavinLNB #diagrams #feature model #requirements #security #using
Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQREFSQ-2014-OjameruayeB #requirements #using
Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
SACSAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech #using
A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SACSAC-2014-Al-RefaiCF #modelling #runtime #using
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-AnderssonDA #artificial reality #identification #using
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SACSAC-2014-BergamascoN #3d #approach #feature model #retrieval #using
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming #using
Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SACSAC-2014-BoghratiHK #framework #process #using
Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SACSAC-2014-ChangHL #adaptation #clustering #optimisation #using
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SACSAC-2014-ChoiKK #modelling #ontology #using
Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SACSAC-2014-Daniel #communication #protocol #using
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-EngielCL #approach #concept #elicitation #using
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-GomesACHS #agile #development #framework #game studies #using
Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SACSAC-2014-HoritaHSNTO #approach #modelling #refinement #using
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JunAK #detection #using
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KrikavaCF14a #domain-specific language #modelling #using
Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SACSAC-2014-LiMZ #using #visualisation
Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SACSAC-2014-ManhaesCZ #architecture #named #predict #using
WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SACSAC-2014-MehdiIHKDS #keyword
Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
SACSAC-2014-OmatuY #classification #smell #using
Smell classification using weakly responding data (SO, MY), pp. 213–214.
SACSAC-2014-PalVCS #detection #smarttech #using
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-ParkKC #framework #kernel #memory management #online #using
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SACSAC-2014-PedrosaP #using
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SACSAC-2014-PengYYHKH #3d #detection #multi #using
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-RossiLR #algorithm #classification #network #using
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SACSAC-2014-SaarsenD #assessment #process #towards
Towards an assessment model for balancing process model production and use (TS, MD), pp. 1386–1392.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-SypeS #case study #online #requirements #social
Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SACSAC-2014-TragatschnigTZ #impact analysis #using
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-WijenayakeP #estimation #using #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SACSAC-2014-YokoyamaKM #using
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SACSAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SACSAC-2014-ZardariBE #using
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SACSAC-2014-Zheng #matrix #using
Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
FSEFSE-2014-LalQ #using #verification
Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSEFSE-2014-VakiliD #infinity #modelling #smt #using #verification
Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSEFSE-2014-YeBL #debugging #learning #rank #using
Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSEICSE-2014-ChenSJHNF #anti #detection #performance #using
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-FritzBMYZ #development #metric #using
Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSEICSE-2014-JungLRP #automation #detection #memory management
Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-MinkuY #estimation #how #question
How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSEICSE-2014-MiyashitaTA #modelling #spreadsheet #using
Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant #using
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SingerFS #developer #how #re-engineering #twitter #using
Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSEICSE-2014-ZayanAC #comprehension #empirical #using
Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SLESLE-J-2012-GuizzardiZ #concept #modelling #ontology #using
Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
SLESLE-2014-Ridge #combinator #context-free grammar #parsing #performance #using
Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
SPLCSPLC-2014-KnappRS #development #modelling #on the #product line #testing
On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLCSPLC-2014-Lantz #agile #case study #development #modelling #using
Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
SPLCSPLC-2014-YuZZJ #automation #case study #feature model #named
TDL: a transformation description language from feature model to use case for automated use case derivation (WY, WZ, HZ, ZJ), pp. 187–196.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction #using
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOSASPLOS-2014-SantosRSW #mobile #runtime #using
Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CCCC-2014-Dinechin #code generation #using
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SurendranBZS #array #using
Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPCAHPCA-2014-KhanAWMJ #clustering #performance #using
Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCAHPCA-2014-KimLJK #architecture #gpu #memory management #named #using
GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDCHPDC-2014-XiangMA #matrix #pipes and filters #scalability #using
Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMMISMM-2014-LiDL #liveness #modelling #using
Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMMISMM-2014-Printezis #perspective #twitter #virtual machine
Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTESLCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence #using
Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PPoPPPPoPP-2014-AgrawalFSSU #data type #parallel #scheduling #source code
Provably good scheduling for parallel programs that use data structures through implicit batching (KA, JTF, BS, JS, RU), pp. 389–390.
PPoPPPPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing #using
Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPPPPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management #using
Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
CAVCAV-2014-0001A #invariant #random #using
From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAVCAV-2014-BinghamL #bound #fault #simulation #using #verification
Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-LarrazNORR #proving #using
Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLPICLP-J-2014-BartakZ #logic programming #problem #using
Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLPICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation #using
Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLPICLP-J-2014-CominiTV #linear #logic #using
Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSSICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing #using
Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCARIJCAR-2014-GoreOT #calculus #implementation #using
Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCARIJCAR-2014-GoreTW #logic #proving #theorem proving #using
A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTAISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread #using
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTAISSTA-2014-YandrapallyTSC #automation #robust #testing #using
Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTAISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing #using
Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
ICSTSAT-2014-BelovHM #proving #using
MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
ICSTSAT-2014-HeymanSMLA #using
Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
ICSTSAT-2014-WetzlerHH #named #performance #proving #using
DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAPTAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml #using
Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis #using
Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSECBSE-2013-BurtonS #correctness #data type #mixin #using
Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSECBSE-2013-GortonLLED #case study #component #experience #using
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSAQoSA-2013-DurdikR #design pattern #documentation #on the #using
On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
ASEASE-2013-AvazpourGG #automation #model transformation #specification #tool support #using #visualisation
Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASEASE-2013-Fard #behaviour #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-GhaisasMA #case study #detection #documentation
Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
ASEASE-2013-HuangMM #proving #smt #using
Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASEASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing #using
Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASEASE-2013-KukrejaHT #game studies #testing #using
Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASEASE-2013-PalombaBPOLP #detection #smell #source code #using
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-SaadaHNS #model transformation #multi #optimisation #using
Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASEASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing #using
Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASEASE-2013-SahaLKP #debugging #information retrieval #locality #using
Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASEASE-2013-ScannielloGMM #clustering #fault #predict #using
Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASEASE-2013-Servant #analysis #debugging #using
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-VanciuA #architecture #constraints #using
Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASECASE-2013-BagchiBNVSS #using
Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASECASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #using #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-BjorkenstamGBCL #energy #industrial #performance #using
Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASECASE-2013-ChenZS #metric #using
A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASECASE-2013-FerreiraL #generative #multi #tool support #using
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-FerreiraR #comparison #design #layout #performance #simulation #using
Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASECASE-2013-Fries #agile #automation #fault #fuzzy #multi #using
Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASECASE-2013-Geldmann #image #monte carlo #simulation #using
Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASECASE-2013-GrosbardKTR #composition #network #using
A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASECASE-2013-HuZL #automation #performance #petri net #synthesis #using
Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASECASE-2013-IsmailH #3d #anti #higher-order #using
Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASECASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning #using
Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LingoR #design #using
A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASECASE-2013-LuSXPO #automation #graph #multi #using
Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASECASE-2013-MarturiDP #image #performance #using
Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASECASE-2013-MohajeraniMF #automaton #composition #finite #using #verification
Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASECASE-2013-NammotoKH #assembly #modelling #using
Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation #using
Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASECASE-2013-ShisheieJBC #design #string #using
Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASECASE-2013-SoviziK #matrix #nondeterminism #parallel #random #using
Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASECASE-2013-WangBR #modelling #monitoring #using
Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASECASE-2013-XuJLYL #energy #optimisation #using
Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASECASE-2013-YueH #concurrent #robust #using
Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASECASE-2013-ZhangPJST #energy #interface #monitoring #scalability #using
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASECASE-2013-ZhangYZH #design #using
Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
DACDAC-2013-BanerjeeDSC #adaptation #constraints #energy #performance #realtime
Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints (DB, SKD, SS, AC), p. 7.
DACDAC-2013-DevWR #3d #integration #testing #using
High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DACDAC-2013-GaillardonMABSLM #towards #using
Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DACDAC-2013-KarthikR #approximate #linear #modelling #named #using
ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DACDAC-2013-LeGHD #simulation #using #verification
Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DACDAC-2013-LiuYLC #named #using
DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DACDAC-2013-MillerVG #modelling #physics #statistics #using
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DACDAC-2013-SchurmansZALACW #architecture #automation #communication #modelling #using
Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DACDAC-2013-SekitaniYTSS #using
Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DACDAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics #using
Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DACDAC-2013-WangK #control flow #detection #hardware #kernel #named #performance #using
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-YuLJC #classification #detection #feature model #using
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AhmadyanKV #algorithm #incremental #runtime #using #verification
Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATEDATE-2013-AnanthanarayananGP #detection #fault #low cost #set #using
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-BackesR #reachability #using
Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATEDATE-2013-BakshiH #reduction #smt #using
LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATEDATE-2013-BernasconiCTV #using
Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATEDATE-2013-BertaccoCBFVKP #on the
On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATEDATE-2013-BrandonW #using
Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATEDATE-2013-BraojosAA #classification #embedded #random #using
A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATEDATE-2013-ChenD #parallel #predict #simulation #using
Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATEDATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis #using
On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATEDATE-2013-DeutschC #multi #using
Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATEDATE-2013-EbrahimiDP #3d #algorithm #fault tolerance #using
Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-GaoGB #fault tolerance #scheduling #using
Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATEDATE-2013-Gomez-PradoCT #latency #optimisation #using
FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method #using
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HellwegeHPP #analysis #metric #reliability
Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATEDATE-2013-HelmstetterCGMV #performance #simulation #using
Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATEDATE-2013-HuNRK #detection #hardware #multimodal #using
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-JooyaB #power management #using
Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATEDATE-2013-LotfianJ #architecture #hardware #power management #smarttech #using
An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATEDATE-2013-LukasiewyczSC #programming #using
Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability #using
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-PaternaR #problem #using
Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATEDATE-2013-PontarelliOEW #detection #fault #using
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-QianJBTMM #analysis #named #performance #using
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management #using
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy #using
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-RustLP #architecture #complexity #using
Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATEDATE-2013-ShreejithVFL #approach #configuration management #network #using
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TzouBHC #bound #composition #using
Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATEDATE-2013-UnutulmazDF #optimisation #using
Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATEDATE-2013-VenkatesanSRR #energy #named #performance #using
DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATEDATE-2013-WangXZWYWNW #using
Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATEDATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction #using
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-YetimMM #streaming
Extracting useful computation from error-prone processors for streaming applications (YY, MM, SM), pp. 202–207.
DATEDATE-2013-ZakharenkoAM #cpu #gpu #performance #using
Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATEDATE-2013-ZhouZY #design #energy #memory management #network #using
The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
DocEngDocEng-2013-DoTT #documentation #taxonomy #using
Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEngDocEng-2013-NourashrafeddinMA #clustering #documentation #interactive #using
Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEngDocEng-2013-SatkhozhinaAA #random #recognition #using
Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEngDocEng-2013-TorabiDT #using
Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEngDocEng-2013-Vion-Dury #documentation #integration #owl #semantics #using
Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRRDRR-2013-AriesON #algorithm #automation #classification #clustering #summary #using
Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRRDRR-2013-KumarPR13a #composition #documentation #evaluation #using
Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRRDRR-2013-KumarWGS #framework #keyword #using
Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRRDRR-2013-MedjkouneMPV #approach #online #recognition #using
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SrihariKTB #using #verification
Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRRDRR-2013-ZhuHZ #image #recognition #retrieval #using
Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HTHT-2013-BellFFNHF #social #social media
Examining social media use among older adults (CB, CBF, SF, JN, LH, WBF), pp. 158–163.
HTHT-2013-WolffMC #data flow #named #using
Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HTHT-2013-WuCH #recommendation #using
Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDARICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval #using
Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDARICDAR-2013-AhmedSLD #segmentation #using
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-AlaeiDG #detection #probability #representation #using
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BaechlerLI #classification #using
Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDARICDAR-2013-BaiYL #correlation #locality #using
Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDARICDAR-2013-BaroniaN #reduction #using
Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDARICDAR-2013-BouillonLAR #gesture #learning #using
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDARICDAR-2013-BreuelUAS #network #using
High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDARICDAR-2013-ChengSAT #classification #data fusion #image #using #visual notation
Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDARICDAR-2013-ChowdhuryBP #distance #metric #online #recognition #using
Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDARICDAR-2013-DuAD #multi #scalability #using
Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDARICDAR-2013-FeildLS #probability #recognition #using
Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDARICDAR-2013-FielS #identification #retrieval #using #visual notation
Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDARICDAR-2013-Furukawa #composition #using
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-GotoIFU #graph #scalability #set #using
Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDARICDAR-2013-HamdaniMN #composition #recognition #using
Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDARICDAR-2013-HerzogSN #graph #retrieval #using
Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDARICDAR-2013-HuC #classification #pseudo #using #verification
Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDARICDAR-2013-HuZ #multi #using
Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features (LH, RZ), pp. 1180–1184.
ICDARICDAR-2013-ItaniHI #using
Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDARICDAR-2013-JainD13a #identification #using
Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
ICDARICDAR-2013-KasarBACP #detection #documentation #image #learning #using
Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDARICDAR-2013-KieuJVMD #3d #documentation #generative #image #using
Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes (VCK, NJ, MV, RM, JPD), pp. 489–493.
ICDARICDAR-2013-KimLT #classification #heuristic #identification #using
Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
ICDARICDAR-2013-KirbyH #analysis #using
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-KrayemSEO #recognition #using #word
Holistic Arabic Whole Word Recognition Using HMM and Block-Based DCT (AK, NS, LJE, TO), pp. 1120–1124.
ICDARICDAR-2013-KunzeKYK #documentation #eye tracking #image #mobile #retrieval #using #word
The Wordometer — Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking (KK, HK, KY, KK), pp. 25–29.
ICDARICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition #using
Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDARICDAR-2013-LuoOWK #approach #automation #classification #using
Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDARICDAR-2013-MalikRPK #documentation #retrieval #using
Handwritten Musical Document Retrieval Using Music-Score Spotting (RM, PPR, UP, FK), pp. 832–836.
ICDARICDAR-2013-Martin-AlboRV #feedback #interactive #online #using
Interactive Off-Line Handwritten Text Transcription Using On-Line Handwritten Text as Feedback (DMA, VR, EV), pp. 1280–1284.
ICDARICDAR-2013-MiyoshiNS #image #using
Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDARICDAR-2013-OpreanLPM #recognition #using #web #word
Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition (CO, LLS, AP, CM), pp. 989–993.
ICDARICDAR-2013-ParvezM #recognition #reduction #using
Lexicon Reduction Using Segment Descriptors for Arabic Handwriting Recognition (MTP, SAM), pp. 1265–1269.
ICDARICDAR-2013-PrumVFO #approach #modelling #online #recognition #using
A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDARICDAR-2013-RayCC #random #recognition #using
Character Recognition Using Conditional Random Field Based Recognition Engine (AR, AC, SC), pp. 18–22.
ICDARICDAR-2013-RazaSDE #detection #multi #using
Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDARICDAR-2013-RoeM #documentation #image #using
Binarization of Color Historical Document Images Using Local Image Equalization and XDoG (ER, CABM), pp. 205–209.
ICDARICDAR-2013-RoySSJ #documentation #n-gram #segmentation #using
Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ICDARICDAR-2013-Saabni #distance #embedded #image #performance #retrieval #using #word
Efficient Word Image Retrieval Using Earth Movers Distance Embedded to Wavelets Coefficients Domain (RS), pp. 314–318.
ICDARICDAR-2013-SunBOK #detection #using
Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDARICDAR-2013-TatawRK #clustering #using
Clustering of Symbols Using Minimal Description Length (OMT, TR, EJK), pp. 180–184.
ICDARICDAR-2013-TianLST #recognition #using
Scene Text Recognition Using Co-occurrence of Histogram of Oriented Gradients (ST, SL, BS, CLT), pp. 912–916.
ICDARICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo #using
Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDARICDAR-2013-WemhoenerYM #multi #using
Creating an Improved Version Using Noisy OCR from Multiple Editions (DW, IZY, RM), pp. 160–164.
ICDARICDAR-2013-YadavCK #using
Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
ICDARICDAR-2013-ZagorisP #detection #image #modelling #using
Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDARICDAR-2013-ZhouTLW #markov #random #recognition #using
Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
ICDARICDAR-2013-ZhuSSGN #2d #online #recognition #using #word
Online Handwritten Cursive Word Recognition Using Segmentation-Free MRF in Combination with P2DBMN-MQDF (BZ, AS, SS, VG, MN), pp. 349–353.
ICDARICDAR-2013-ZhuZ #detection #image #recognition #using
Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
ICDARICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation #using
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
SIGMODSIGMOD-2013-AbiteboulAMST #development #rule-based #using
Rule-based application development using Webdamlog (SA, ÉA, GM, JS, JT), pp. 965–968.
SIGMODSIGMOD-2013-CaiVPAHJ #markov #simulation #using
Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
SIGMODSIGMOD-2013-Cohen #distance #edit distance #using
Indexing for subtree similarity-search using edit distance (SC), pp. 49–60.
SIGMODSIGMOD-2013-DeshpandeLTDSRHD #knowledge base #maintenance #using
Building, maintaining, and using knowledge bases: a report from the trenches (OD, DSL, MT, SD, SS, AR, VH, AD), pp. 1209–1220.
SIGMODSIGMOD-2013-FernandezMKP #fault tolerance #using
Integrating scale out and fault tolerance in stream processing using operator state management (RCF, MM, EK, PP), pp. 725–736.
SIGMODSIGMOD-2013-GiannikisMAK #optimisation #using
Workload optimization using SharedDB (GG, DM, GA, DK), pp. 1045–1048.
SIGMODSIGMOD-2013-UpadhyayaABHKRS #power of
The power of data use management in action (PU, NRA, MB, BH, RK, RR, DS), pp. 1117–1120.
SIGMODSIGMOD-2013-WhangYYSKK #approach #named #parallel #using
ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMODSIGMOD-2013-YakoutBE #automation #bound #scalability
Don’t be SCAREd: use SCalable Automatic REpairing with maximal likelihood and bounded changes (MY, LBE, AKE), pp. 553–564.
SIGMODSIGMOD-2013-YangWQWL #string #using
Improving regular-expression matching on strings using negative factors (XY, BW, TQ, YW, CL), pp. 361–372.
SIGMODSIGMOD-2013-ZhangGBFRP #named #statistics #using
GeoDeepDive: statistical inference using familiar data-processing languages (CZ, VG, JB, TF, CR, SP), pp. 993–996.
SIGMODSIGMOD-2013-ZhangXYZW #algorithm #named #search-based #using
PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
VLDBVLDB-2013-0002GJ #correlation #markov #modelling #using
Travel Cost Inference from Sparse, Spatio-Temporally Correlated Time Series Using Markov Models (BY, CG, CSJ), pp. 769–780.
VLDBVLDB-2013-BediniEV #big data #case study #framework #scalability
The Trento Big Data Platform for Public Administration and Large Companies: Use cases and Opportunities (IB, BE, YV), pp. 1166–1167.
VLDBVLDB-2013-ChirkovaY #question #what
Big and Useful: What’s in the Data for Me? (RC, JY), pp. 1390–1391.
VLDBVLDB-2013-DengJLLY #concept #knowledge base #scalability #using #web
Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases (DD, YJ, GL, JL, CY), pp. 1606–1617.
VLDBVLDB-2013-KondaKRS #data analysis #enterprise #feature model #using
Feature Selection in Enterprise Analytics: A Demonstration using an R-based Data Analytics System (PK, AK, CR, VS), pp. 1306–1309.
VLDBVLDB-2013-KotsakosSKG #health #monitoring #named #smarttech #using
SmartMonitor: Using Smart Devices to Perform Structural Health Monitoring (DK, PS, VK, DG), pp. 1282–1285.
VLDBVLDB-2013-MahmoudNPAA #commit #database #multi #using
Low-Latency Multi-Datacenter Databases using Replicated Commit (HAM, FN, AP, DA, AEA), pp. 661–672.
VLDBVLDB-2013-OgdenTP #automaton #parallel #query #scalability #transducer #using #xml
Scalable XML Query Processing using Parallel Pushdown Transducers (PO, DBT, PP), pp. 1738–1749.
VLDBVLDB-2013-ParkMS #parallel #pipes and filters #query #using
Parallel Computation of Skyline and Reverse Skyline Queries Using MapReduce (YP, JKM, KS), pp. 2002–2013.
VLDBVLDB-2013-SimoesGG #algorithm #approximate #information management #performance #using
When Speed Has a Price: Fast Information Extraction Using Approximate Algorithms (GS, HG, LG), pp. 1462–1473.
VLDBVLDB-2013-StoicaA #performance #using
Improving Flash Write Performance by Using Update Frequency (RS, AA), pp. 733–744.
VLDBVLDB-2013-SundaramTSMIMD #parallel #similarity #streaming #twitter #using
Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing (NS, AT, NS, TM, PI, SM, PD), pp. 1930–1941.
VLDBVLDB-2013-YuanL013a #using
Making Updates Disk-I/O Friendly Using SSDs (MS, KAR, MC, BB), pp. 997–1008.
CSEETCSEET-2013-ArdisBCVI #education #re-engineering #source code #using
Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
CSEETCSEET-2013-CookDSSCH #ide #reasoning #specification #using #web
Specification and reasoning in SE projects using a Web IDE (CTC, SDS, YSS, MS, JCC, JEH), pp. 229–238.
CSEETCSEET-2013-FortalezaVJPC #collaboration #communication #development #distributed #using
Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study (LLF, SRCV, OOMJ, RP, TC), pp. 139–148.
CSEETCSEET-2013-WernerKSVW #challenge #collaboration #education #re-engineering
Software engineering education via the use of corporate-sponsored projects: A panel discussion of the approaches, benefits, and challenges for industry-academic collaboration (LLW, GK, MJS, JV, WEW), pp. 346–350.
ITiCSEITiCSE-2013-Alabdulqader #using #visualisation
Visualizing computer ethics using infographics (EA), p. 355.
ITiCSEITiCSE-2013-Baumgartner #approach #case study #design #education #information management #using
Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSEITiCSE-2013-BeltranGP #architecture #concept #in the cloud #using
Using CloudSim to learn cloud computing architecture/system concepts in a graduate course (MB, AG, MP), pp. 82–87.
ITiCSEITiCSE-2013-BuckD #authentication #education #modelling #using
Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
ITiCSEITiCSE-2013-EllisHD #using
Developing HFOSS projects using integrated teams across levels and institutions (HJCE, GWH, JD), p. 349.
ITiCSEITiCSE-2013-Law #interactive #using
Interactive lectures using quick response codes (RL), p. 317.
ITiCSEITiCSE-2013-Law13a #feedback #game studies #programming #student #using
Using screencasts to enhance coursework feedback for game programming students (RL), p. 329.
ITiCSEITiCSE-2013-MedinaPGR #data mining #education #learning #mining #programming #using
Assistance in computer programming learning using educational data mining and learning analytics (CFM, JRPP, VMÁG, MdPPR), pp. 237–242.
ITiCSEITiCSE-2013-MellodgeR #arduino #case study #experience #framework #learning #student #using
Using the arduino platform to enhance student learning experiences (PM, IR), p. 338.
ITiCSEITiCSE-2013-RowanD #bibliography #learning #mobile #using
A systematic literature review on using mobile computing as a learning intervention (MR, JD), p. 339.
ITiCSEITiCSE-2013-TrabelsiA #education #generative #network #using
Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
ITiCSEITiCSE-2013-VihavainenVLP #learning #student #using
Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
ESOPESOP-2013-KassiosK #verification
A Discipline for Program Verification Based on Backpointers and Its Use in Observational Disjointness (ITK, EK), pp. 149–168.
FASEFASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards #using
Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
FASEFASE-2013-MacedoC #alloy #bidirectional #implementation #model transformation #qvt #using
Implementing QVT-R Bidirectional Model Transformations Using Alloy (NM, AC), pp. 297–311.
TACASTACAS-2013-FalkeMS #bound #c #contest #model checking #named #source code #using
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACASTACAS-2013-VizelGS #analysis #reachability #using
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
CSMRCSMR-2013-AsgharMSS #metric #requirements #traceability #using
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMRCSMR-2013-BagnatoSBV #case study #industrial #internet #testing #uml
The OMG UML Testing Profile in Use — An Industrial Case Study for the Future Internet Testing (AB, AS, EB, TEJV), pp. 457–460.
CSMRCSMR-2013-NerellaMW #approach #optimisation #query #using
An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
CSMRCSMR-2013-OuniKS #refactoring #search-based #using
Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMRCSMR-2013-PanichellaMMPOPL #how #traceability #using
When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
CSMRCSMR-2013-ScannielloECG #gpu #using
Using the GPU to Green an Intensive and Massive Computation System (GS, UE, GC, CG), pp. 384–387.
CSMRCSMR-2013-SnajberkHB #component #using #visualisation
Visualization of Component-Based Applications Structure Using AIVA (JS, LH, PB), pp. 409–412.
CSMRCSMR-2013-TothNFS #source code #using #version control
Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPCICPC-2013-DiazBMOTL #traceability #using
Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICSMEICSM-2013-CruzIP #development #empirical #using #validation
An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves (AECC, HI, NP), pp. 468–471.
ICSMEICSM-2013-DitMVP #component #library #maintenance #research #using
Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library (BD, EM, MLV, DP), pp. 330–339.
ICSMEICSM-2013-KhanBEL #evolution #named #using
eCITY: A Tool to Track Software Structural Changes Using an Evolving City (TK, HB, AE, PL), pp. 492–495.
ICSMEICSM-2013-NordOSDGK #architecture #using
Variations on Using Propagation Cost to Measure Architecture Modifiability Properties (RLN, IO, RSS, JD, MAG, PK), pp. 400–403.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
ICSMEICSM-2013-TabaKZHN #debugging #predict #using
Predicting Bugs Using Antipatterns (SEST, FK, YZ, AEH, MN), pp. 270–279.
ICSMEICSM-2013-WrightJKCW #automation #refactoring #scalability #using
Large-Scale Automated Refactoring Using ClangMR (HKW, DJ, MK, CC, ZW), pp. 548–551.
MSRMSR-2013-AlaliBNM #detection #distance #metric #using
A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSRMSR-2013-AllamanisS13a #mining #modelling #repository #source code #using
Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-HuW #fault #predict #using
Using citation influence to predict software defects (WH, KW), pp. 419–428.
MSRMSR-2013-NaguibNBH #debugging #process #recommendation #using
Bug report assignee recommendation using activity profiles (HN, NN, BB, DH), pp. 22–30.
MSRMSR-2013-RobbesR #developer #interactive #metric #using
Using developer interaction data to compare expertise metrics (RR, DR), pp. 297–300.
MSRMSR-2013-StevensGFDC #android
Asking for (and about) permissions used by Android apps (RS, JG, VF, PTD, HC), pp. 31–40.
MSRMSR-2013-VasquezDP #analysis #development #mobile #stack overflow #using
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
MSRMSR-2013-WangKZ #correlation #debugging #locality #using
Improving bug localization using correlations in crash reports (SW, FK, YZ), pp. 247–256.
SCAMSCAM-2013-NicolayNRM #javascript #type inference #using
Determining dynamic coupling in JavaScript using object type inference (JN, CN, CDR, WDM), pp. 126–135.
SCAMSCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
WCREWCRE-2013-KomondoorBDK #domain model #modelling #using
Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCREWCRE-2013-SalesTMV #dependence #recommendation #refactoring #set #using
Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
WCREWCRE-2013-XingXJ #difference
Distilling useful clones by contextual differencing (ZX, YX, SJ), pp. 102–111.
PEPMPEPM-2013-AlpuenteFV #automation #logic #specification #using
Automatic inference of specifications using matching logic (MA, MAF, AV), pp. 127–136.
PEPMPEPM-2013-Simon #type inference #using
Deriving a complete type inference for hindley-milner and vector sizes using expansion (AS), pp. 13–22.
PLDIPLDI-2013-GaoSBMBL #runtime #smarttech #using
Using managed runtime systems to tolerate holes in wearable memories (TG, KS, SMB, KSM, DB, JRL), pp. 297–308.
PLDIPLDI-2013-GveroKKP #using
Complete completion using types and weights (TG, VK, IK, RP), pp. 27–38.
SASSAS-2013-WhiteM #algebra #analysis #memory management #optimisation #using
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
STOCSTOC-2013-JainNS #matrix #rank #using
Low-rank matrix completion using alternating minimization (PJ, PN, SS), pp. 665–674.
STOCSTOC-2013-LeeRS #approach #using
A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
STOCSTOC-2013-LenzenP #performance #using
Fast routing table construction using small messages: extended abstract (CL, BPS), pp. 381–390.
STOCSTOC-2013-Miller #graph #optimisation #problem #scalability #using
Solving large optimization problems using spectral graph theory (GLM), p. 981.
STOCSTOC-2013-Sherstov #bound #communication #using
Communication lower bounds using directional derivatives (AAS), pp. 921–930.
CIAACIAA-2013-BelliB #testing #using
Using Regular Grammars for Event-Based Testing (FB, MB), pp. 48–59.
ICALPICALP-v2-2013-BachrachP #big data #performance #pseudo #recommendation #sketching #using
Sketching for Big Data Recommender Systems Using Fast Pseudo-random Fingerprints (YB, EP), pp. 459–471.
IFMIFM-2013-MorgensternGS #game studies #incremental #induction #using
Solving Games Using Incremental Induction (AM, MG, KS), pp. 177–191.
IFMIFM-2013-SavaryFL #bytecode #detection #modelling #testing #using #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
IFMIFM-2013-VekrisLDM #specification #using #verification
Verification of EB3 Specifications Using CADP (DV, FL, CD, RM), pp. 61–76.
SEFMSEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt #using
Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis #using
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
SEFMSEFM-2013-SuryadevaraSMP #behaviour #using #verification
Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
ICFPICFP-2013-AxelssonC #functional #higher-order #source code #syntax #using
Using circular programs for higher-order syntax: functional pearl (EA, KC), pp. 257–262.
GT-VMTGT-VMT-2013-RungeKH #contract #generative #testing #using #visual notation
Test Case Generation Using Visual Contracts (OR, TAK, RH).
CHICHI-2013-AnthonyKF #people
Analyzing user-generated youtube videos to understand touchscreen use by people with motor impairments (LA, YK, LF), pp. 1223–1232.
CHICHI-2013-BanNFSITH #artificial reality #using
Augmented endurance: controlling fatigue while handling objects by affecting weight perception using augmented reality (YB, TN, TF, SS, JI, TT, MH), pp. 69–78.
CHICHI-2013-BaumerAKLSSW #case study #experience #facebook
Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences (EPSB, PA, VDK, TCL, MES, VSS, KW), pp. 3257–3266.
CHICHI-2013-BirnbaumBFDK #behaviour #identification #using
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-BranzelHHSKLM0B13a #named #smarttech #using
GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor (AB, CH, DH, DS, MK, PL, RM, SR, PB), pp. 725–734.
CHICHI-2013-BrownML #analysis #mobile #video
iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHICHI-2013-CassidyAR #game studies #mobile #using
Using an open card sort with children to categorize games in a mobile phone application store (BC, DSA, JCR), pp. 2287–2290.
CHICHI-2013-ChenGS #multi #student
Graduate student use of a multi-slate reading system (NC, FG, AS), pp. 1799–1808.
CHICHI-2013-DoornSG #design #experience #research #user interface #using
Design research by proxy: using children as researchers to gain contextual knowledge about user experience (FvD, PJS, MG), pp. 2883–2892.
CHICHI-2013-DowGW #case study #using
A pilot study of using crowds in the classroom (SD, EG, AW), pp. 227–236.
CHICHI-2013-GoelJMPW #mobile #named #using
ContextType: using hand posture information to improve mobile touch screen text entry (MG, AJ, TM, SNP, JOW), pp. 2795–2798.
CHICHI-2013-GuHHKL #named #using
LongPad: a touchpad using the entire area below the keyboard of a laptop computer (JG, SH, JH, SK, GL), pp. 1421–1430.
CHICHI-2013-HeklerKFB #behaviour #human-computer #research #using
Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
CHICHI-2013-HongYKAA #independence #network #social
Investigating the use of circles in social networks to support independence of individuals with autism (HH, SY, JGK, GDA, RIA), pp. 3207–3216.
CHICHI-2013-HuFM #community #social #social media #using
Whoo.ly: facilitating information seeking for hyperlocal communities using social media (YH, SDF, AMH), pp. 3481–3490.
CHICHI-2013-KujalaM #case study #experience #mobile #usability
Emotions, experiences and usability in real-life mobile phone use (SK, TMS), pp. 1061–1070.
CHICHI-2013-LomasPFK #challenge #design #education #game studies #optimisation #scalability #using
Optimizing challenge in an educational game using large-scale design experiments (DL, KP, JF, KRK), pp. 89–98.
CHICHI-2013-LucaZPH #using
Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
CHICHI-2013-MalacriaBHCG
Promoting Hotkey use through rehearsal with ExposeHK (SM, GB, JH, AC, CG), pp. 573–582.
CHICHI-2013-MankoffRF #research #using
Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHICHI-2013-MarcuTCGRSDK #comprehension #education #why
Why do they still use paper?: understanding data collection and use in Autism education (GM, KT, QC, JG, GR, KJS, AKD, SBK), pp. 3177–3186.
CHICHI-2013-MassungCCJP #community #crowdsourcing #using
Using crowdsourcing to support pro-environmental community activism (EM, DC, KFC, MJ, CP), pp. 371–380.
CHICHI-2013-MollersDLB #scalability #using
Improving touch accuracy on large tabletops using predecessor and successor (MM, ND, SL, JOB), pp. 755–758.
CHICHI-2013-NancelCPYIB #scalability #using
High-precision pointing on large wall displays using small handheld devices (MN, OC, EP, XDY, PPI, MBL), pp. 831–840.
CHICHI-2013-OneyHOW #named #using
ZoomBoard: a diminutive qwerty soft keyboard using iterative zooming for ultra-small devices (SO, CH, AO, JW), pp. 2799–2802.
CHICHI-2013-Ortega #3d #automation #using
3D object position using automatic viewpoint transitions (MO), pp. 193–196.
CHICHI-2013-ParkBN
The roles of touch during phone conversations: long-distance couples’ use of POKE in their homes (YP, KMB, TJN), pp. 1679–1688.
CHICHI-2013-PeckYOJC #interface #using #visualisation
Using fNIRS brain sensing to evaluate information visualization interfaces (EMP, BFY, AO, RJKJ, RC), pp. 473–482.
CHICHI-2013-PriorWBK #agile #development
Use of an agile bridge in the development of assistive technology (SP, AW, RB, TK), pp. 1579–1588.
CHICHI-2013-RoudautRSPLB #feedback #gesture #using
Gesture output: eyes-free output using a force feedback touch surface (AR, AR, CS, MP, PL, PB), pp. 2547–2556.
CHICHI-2013-ShiXC #bound #network #social #using
Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CHICHI-2013-SpauldingF #design #prototype #using
Design-driven narrative: using stories to prototype and build immersive design worlds (ES, HF), pp. 2843–2852.
CHICHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network #privacy
Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
CHICHI-2013-SutcliffeIFPSG #using
Improving digital handoff using the space above the table (SWTS, ZI, DRF, AP, IS, CG), pp. 735–744.
CHICHI-2013-TausczikP #feedback #realtime #using
Improving teamwork using real-time language feedback (YRT, JWP), pp. 459–468.
CHICHI-2013-WisemanCBGO #detection #fault #using
Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CHICHI-2013-WulfAKASRYR #social #social media
Fighting against the wall: social media use by political activists in a Palestinian village (VW, KA, IAK, MA, KS, MR, GPY, DR), pp. 1979–1988.
CHICHI-2013-WycheFS #comprehension #facebook #online
Hustling online: understanding consolidated facebook use in an informal settlement in Nairobi (SW, AF, SYS), pp. 2823–2832.
CSCWCSCW-2013-Barlow #chat #using
Emergent roles in decision-making tasks using group chat (JBB), pp. 1505–1514.
CSCWCSCW-2013-BatemanGM #navigation #social #using
Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear (SB, CG, GIM), pp. 955–966.
CSCWCSCW-2013-BuhlerNH #chat #how #video #why
How and why teenagers use video chat (TB, CN, SH), pp. 759–768.
CSCWCSCW-2013-BurkeK #difference #facebook #using
Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CSCWCSCW-2013-ChoiHHLS #communication #mining #social #using
Mining social relationship types in an organization using communication patterns (JC, SH, JH, GL, JS), pp. 295–302.
CSCWCSCW-2013-GeigerH #using #wiki
Using edit sessions to measure participation in wikipedia (RSG, AH), pp. 861–870.
CSCWCSCW-2013-HarperM #artificial reality #social
The mocking gaze: the social organization of kinect use (RHRH, HMM), pp. 167–180.
CSCWCSCW-2013-HuangF #consistency #evaluation #reliability #using
Enhancing reliability using peer consistency evaluation in human computation (SWH, WTF), pp. 639–648.
CSCWCSCW-2013-JungLDAHB #using
Engaging robots: easing complex human-robot teamwork using backchanneling (MFJ, JJL, ND, SOA, PJH, CB), pp. 1555–1566.
CSCWCSCW-2013-KarnikOVSN #facebook
Uses & gratifications of a facebook media sharing group (MK, IO, JV, TS, VN), pp. 821–826.
CSCWCSCW-2013-KusunokiSZB #comprehension #monitoring #visual notation
Understanding visual attention of teams in dynamic medical settings through vital signs monitor use (DSK, AS, ZZ, RSB), pp. 527–540.
CSCWCSCW-2013-QuinonesTL #design
Appropriation by unanticipated users: looking beyond design intent and expected use (PAQ, SDT, SL), pp. 1515–1526.
CSCWCSCW-2013-RobsonHKP #network #social
Comparing the use of social networking and traditional media channels for promoting citizen science (CR, MAH, CK, JSP), pp. 1463–1468.
CSCWCSCW-2013-SmithQC #analysis #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
CSCWCSCW-2013-ThayerSL #using
Recalibrating the ratio: enacting accountability in intimate relationships using shared calendars (AT, BS, CPL), pp. 203–214.
CSCWCSCW-2013-WangM #online #social #social media #trust
Trust in online news: comparing social media and official media use by chinese citizens (YW, GM), pp. 599–610.
CSCWCSCW-2013-WulfMARR #social #social media
“On the ground” in Sidi Bouzid: investigating social media use during the Tunisian revolution (VW, KM, MA, DR, MR), pp. 1409–1418.
CSCWCSCW-2013-WycheSF #case study #facebook #quote #social #social media
“Facebook is a luxury”: an exploratory study of social media use in rural Kenya (SW, SYS, AF), pp. 33–44.
CSCWCSCW-2013-YaroshTMA #communication #quote #using
“Almost touching”: parent-child remote communication using the sharetable system (SY, AT, SM, GDA), pp. 181–192.
HCIDHM-HB-2013-CaoJHK #assessment #modelling #using
Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
HCIDHM-HB-2013-HuhK #estimation #image #using
Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
HCIDHM-HB-2013-KeyvaniLBO #database #metric #using
Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, ), pp. 343–352.
HCIDHM-HB-2013-KuzMMS #human-computer #industrial #interactive #morphism #using
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part I) (SK, MPM, SM, CMS), pp. 76–85.
HCIDHM-HB-2013-MayerKS #human-computer #industrial #interactive #morphism #using
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part II) (MPM, SK, CMS), pp. 93–100.
HCIDHM-HB-2013-NakamuraKOOHNAKMK #artificial reality #learning #self #student #towards #using
The Relationship between Nursing Students’ Attitudes towards Learning and Effects of Self-learning System Using Kinect (MN, YK, JO, TO, ZH, AN, KA, NK, JM, MKP), pp. 111–116.
HCIDHM-HB-2013-WiezerRO #game studies
Serious Gaming Used as Management Intervention to Prevent Work-Related Stress and Raise Work-Engagement among Workers (NW, MBR, EO), pp. 149–158.
HCIDHM-SET-2013-BaptistaSVQCD #interactive #using
Using Digital Interactive Television to Promote Healthcare and Wellness Inclusive Services (AB, ÁDS, IV, CQ, MC, MJD), pp. 150–156.
HCIDHM-SET-2013-BrooksB #game studies #using #video
Facilitators’ Intervention Variance and Outcome Influence When Using Video Games with Fibromyalgia Patients (ALB, EPB), pp. 163–172.
HCIDHM-SET-2013-KosugeIM #case study #multi #using
A Study for Conducting Waves by Using the Multi-channel Surface EMG (TK, NI, KM), pp. 223–231.
HCIDHM-SET-2013-MurataKEH #behaviour #metric #predict #using
Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
HCIDHM-SET-2013-MurataKMH
Proposal of Automotive 8-directional Warning System That Makes Use of Tactile Apparent Movement (AM, SK, MM, TH), pp. 98–107.
HCIDHM-SET-2013-OkimotoPOM #usability
Usability of Portable Fire Extinguisher: Perspectives of Ergonomics and Intuitive Use (MLLRO, MP, STdO, VM), pp. 355–364.
HCIDHM-SET-2013-PuchWFP #evaluation #interactive #simulation #using
Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
HCIDHM-SET-2013-YangYF #safety #using
Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
HCIDUXU-CXC-2013-BamasakBAAAA #artificial reality #social #using
Improving Autistic Children’s Social Skills Using Virtual Reality (OB, RB, HAT, SAH, GAS, MAH), pp. 342–351.
HCIDUXU-CXC-2013-LawrenceMPFSB #interactive #using #visualisation
Investigation of Interaction Modalities Designed for Immersive Visualizations Using Commodity Devices in the Classroom (KL, AM, NP, TF, JS, AUB), pp. 209–218.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management #using
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIDUXU-CXC-2013-Said #network #social
Young Egyptians Use of Social Networks and the January 2011 Revolution (GRES), pp. 38–43.
HCIDUXU-CXC-2013-WindlH #aspect-oriented #design
Intercultural Design for Use — Extending Usage-Centered Design by Cultural Aspects (HW, RH), pp. 139–148.
HCIDUXU-NTE-2013-AyanogluRDNT #artificial reality #design #using
Using Virtual Reality to Examine Hazard Perception in Package Design (HA, FR, ED, PN, LT), pp. 30–39.
HCIDUXU-NTE-2013-DinisDNTVR #artificial reality #case study #design #using
Evaluating Emotional Responses to the Interior Design of a Hospital Room: A Study Using Virtual Reality (SD, ED, PN, LT, EV, FR), pp. 475–483.
HCIDUXU-NTE-2013-FeijsKSL #design #using
Design for Relaxation during Milk Expression Using Biofeedback (LMGF, JK, NHvS, MvL), pp. 494–503.
HCIDUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive #using
Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
HCIDUXU-NTE-2013-KulkarniW #energy #using
Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
HCIDUXU-NTE-2013-Lam #interactive #using
Creating Instantly Disappearing Prints Using Thermochromic Paint and Thermal Printer in an Interactive Art Installation (MLL), pp. 290–295.
HCIDUXU-NTE-2013-ReisDR #usability #using
Main Usability Issues in Using Virtual Environments for Older Population Warning Studies (LR, ED, FR), pp. 189–198.
HCIDUXU-NTE-2013-Shieh #design #segmentation #using
Designing a Product Satisfaction Model Using Customer Segmentation and Information Consolidation (MDS), pp. 568–577.
HCIDUXU-PMT-2013-BuchdidPB #design
Designing iDTV Applications from Participatory Use of Patterns (SBB, RP, MCCB), pp. 459–468.
HCIDUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability #using
Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
HCIDUXU-PMT-2013-JiangL #adaptation #effectiveness #matrix #using
Understand System’s Relative Effectiveness Using Adapted Confusion Matrix (NJ, HL), pp. 294–302.
HCIDUXU-PMT-2013-KitamuraKNSYM #community #using
Community Participation Support Using an ICF-Based Community Map (SK, KK, YN, KIS, JY, HM), pp. 516–524.
HCIDUXU-PMT-2013-PrisacariH #design #using
Using Eye-Tracking to Test and Improve Website Design (AP, TH), pp. 389–398.
HCIDUXU-WM-2013-GencerBZV #framework #machine learning #mobile #using
A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
HCIDUXU-WM-2013-Iitaka #using
ARS Module of Contents Management System Using Cell Phones (TI), pp. 682–690.
HCIDUXU-WM-2013-KondoK #development #evaluation #image #interactive #prototype #using #visual notation
Trial of Diagnostic to Find Preferable Job Using the Visual Image Information Interaction: Prototype Development and Evaluation in Global Human Resources Matching Site (AK, NK), pp. 525–532.
HCIDUXU-WM-2013-MinJ #functional #named #using
TRIGGER: Maximizing Functional Effect of Using Products (KBM, ECJ), pp. 385–391.
HCIHCI-AMTE-2013-AkiyoshiT #estimation #eye tracking #framework #interface #learning #using
An Estimation Framework of a User Learning Curve on Web-Based Interface Using Eye Tracking Equipment (MA, HT), pp. 159–165.
HCIHCI-AMTE-2013-Bevan #documentation #industrial #using
Using the Common Industry Format to Document the Context of Use (NB), pp. 281–289.
HCIHCI-AMTE-2013-GuWYL #design #interactive #using
A Color Schemer for Webpage Design Using Interactive Mood Board (ZG, ZW, JY, JL), pp. 555–564.
HCIHCI-AMTE-2013-HirataY #design pattern #logic #user interface #using
A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCIHCI-AMTE-2013-HumayounEE #case study #framework #mobile #using
Developing Mobile Apps Using Cross-Platform Frameworks: A Case Study (SRH, SE, AE), pp. 371–380.
HCIHCI-AS-2013-BergmansS #behaviour #mobile #persuasion #using
Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
HCIHCI-AS-2013-CharoenpitO #biology #using
A New E-learning System Focusing on Emotional Aspect Using Biological Signals (SC, MO), pp. 343–350.
HCIHCI-AS-2013-DePaloPS #documentation #summary #using
Healthcare Interoperability: CDA Documents Consolidation Using Transport Record Summary (TRS) Construction (PD, KEP, YTS), pp. 56–65.
HCIHCI-AS-2013-HarunBON #learning #using
Refining Rules Learning Using Evolutionary PD (AFH, SB, CO, NLMN), pp. 376–385.
HCIHCI-AS-2013-HuseyinovT #algebra #evaluation #fuzzy #using
Evaluation of Computer Algebra Systems Using Fuzzy AHP at the Universities of Cyprus (IH, FST), pp. 391–397.
HCIHCI-AS-2013-KrauseB #information management #process #using
Subjective Ratings in an Ergonomic Engineering Process Using the Example of an In-Vehicle Information System (MK, KB), pp. 596–605.
HCIHCI-AS-2013-KroesS #mobile #persuasion #using
Empowering Young Adolescents to Choose the Healthy Lifestyle: A Persuasive Intervention Using Mobile Phones (LK, SS), pp. 117–126.
HCIHCI-AS-2013-LimaRSBSO #learning
Innovation in Learning — The Use of Avatar for Sign Language (TL, MSR, TAS, AB, ES, HSdO), pp. 428–433.
HCIHCI-AS-2013-MatsumotoAK #development #email #learning #using #word
Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
HCIHCI-AS-2013-Rauch #enterprise #gamification #using
Best Practices for Using Enterprise Gamification to Engage Employees and Customers (MR), pp. 276–283.
HCIHCI-AS-2013-TakahashiISUSHO #biology #eye tracking #using
Proposal for Driver Distraction Indexes Using Biological Signals Including Eye Tracking (NT, SI, HS, SU, YS, KH, MO), pp. 647–653.
HCIHCI-AS-2013-TsumoriN #design #evaluation #using
Design and Evaluation of Training System for Numerical Calculation Using Questions in SPI2 (ST, KN), pp. 511–520.
HCIHCI-AS-2013-YajimaG #using
The Proposal of the Remote Consultation Service System Using the Outline Function for Consultation (HY, TG), pp. 216–225.
HCIHCI-III-2013-AnKK #development #interface #usability #using
Development of a Virtual Keyboard System Using a Bio-signal Interface and Preliminary Usability Test (KOA, DHK, JK), pp. 3–9.
HCIHCI-III-2013-HeLWG #image #segmentation #using
Semi-supervised Remote Sensing Image Segmentation Using Dynamic Region Merging (NH, KL, YW, YG), pp. 153–162.
HCIHCI-III-2013-IteyaMK #analysis #using #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-LimD
Evaluating Intelligibility Usage and Usefulness in a Context-Aware Application (BYL, AKD), pp. 92–101.
HCIHCI-III-2013-MiwaWS #feedback #recognition #reliability #robust #using
Robust Face Recognition System Using a Reliability Feedback (SM, SW, MS), pp. 178–185.
HCIHCI-III-2013-SakamotoSYO #3d #metric #using
Evaluating Emotional State during 3DTV Viewing Using Psychophysiological Measurements (KS, SS, KY, AO), pp. 353–361.
HCIHCI-III-2013-ShinKS #image #probability #retrieval #using
Affect-Based Retrieval of Landscape Images Using Probabilistic Affective Model (YS, EYK, TES), pp. 362–371.
HCIHCI-III-2013-TsurudaHYI #generative #mobile #using
Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
HCIHCI-III-2013-Yang-MaoLLZW #evaluation #image #using
Evaluation of Mono/Binocular Depth Perception Using Virtual Image Display (SFYM, YTL, MHL, WJZ, YlW), pp. 483–490.
HCIHCI-III-2013-YangZZJXW #detection #multi #realtime #using
Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCIHCI-III-2013-ZhanZSY #image #multi #re-engineering #using #visual notation
Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders (YZ, JZ, SS, LY), pp. 491–497.
HCIHCI-IMT-2013-EbisawaF #detection #using #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHCI-IMT-2013-HammerB #realtime #robust #using
Robust Hand Tracking in Realtime Using a Single Head-Mounted RGB Camera (JHH, JB), pp. 252–261.
HCIHCI-IMT-2013-LeeBN #visual notation
Use of Reference Frame in Haptic Virtual Environments: Implications for Users with Visual Impairments (JYL, SB, CSN), pp. 610–617.
HCIHCI-IMT-2013-LeeT #gesture #interactive #using
Finger Controller: Natural User Interaction Using Finger Gestures (UL, JT), pp. 281–290.
HCIHCI-IMT-2013-MurataHMH #case study #interface #using
Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCIHCI-IMT-2013-PinoTIK #2d #3d #artificial reality #evaluation #performance #using
Using Kinect for 2D and 3D Pointing Tasks: Performance Evaluation (AP, ET, NI, GK), pp. 358–367.
HCIHCI-IMT-2013-SakairiTKG #editing #multi #using #visual notation
Multi-layer Control and Graphical Feature Editing Using Server-Side Rendering on Ajax-GIS (TS, TT, KK, YG), pp. 722–729.
HCIHCI-IMT-2013-SakamotoTT #music #using
A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCIHCI-IMT-2013-ShimizuNS #algorithm #generative #search-based #using
System of Generating Japanese Sound Symbolic Expressions Using Genetic Algorithm (YS, TN, MS), pp. 126–134.
HCIHCI-IMT-2013-SrivastavaT #analysis #realtime #using
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-IMT-2013-TungGKM #human-computer #interactive #multimodal #using
Multi-party Human-Machine Interaction Using a Smart Multimodal Digital Signage (TT, RG, TK, TM), pp. 408–415.
HCIHCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech #using
A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
HCIHCI-IMT-2013-YoshikawaMKST #using
A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
HCIHCI-UC-2013-ItouTM #communication #development #interface #using
Development of Communication Support System at Mealtimes Using Tabletop Interface (JI, ST, JM), pp. 174–182.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-LinHW #learning #using #visual notation
Establishing a Cognitive Map of Public Place for Blind and Visual Impaired by Using IVEO Hands-On Learning System (QWL, SLH, JLW), pp. 193–198.
HCIHCI-UC-2013-OkiTS #named #using
AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCIHCI-UC-2013-TsaiHCL #communication #named #network #online #product line #social #using
Memotree: Using Online Social Networking to Strengthen Family Communication (THT, YLH, HTC, YWL), pp. 359–367.
HCIHIMI-D-2013-AsaoSK #estimation #using
Estimation of Driver’s Steering Intention by Using Mechanical Impedance (TA, SS, KK), pp. 3–11.
HCIHIMI-D-2013-EnokidaKSAII #information management #metric #using
Assessing Mental Workload of In-Vehicle Information Systems by Using Physiological Metrics (SE, KK, SS, TA, TI, KI), pp. 584–593.
HCIHIMI-D-2013-IizukaNG #case study #interactive #scalability
A Study for Personal Use of the Interactive Large Public Display (SI, WN, KG), pp. 55–61.
HCIHIMI-D-2013-KotaniKSA #analysis #development #memory management #using
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-ManiwaKSA
Changes in Posture of the Upper Extremity Through the Use of Various Sizes of Tablets and Characters (HM, KK, SS, TA), pp. 89–96.
HCIHIMI-D-2013-McCoyLMR #quality
The Effects of Website Familiarity on Website Quality and Intention to Use (SM, ETL, GM, CFR), pp. 213–220.
HCIHIMI-D-2013-MorodomeSAK #biology #metric #using
Non-contact Measurement of Biological Signals Using Microwave Radar (HM, SS, TA, KK), pp. 117–125.
HCIHIMI-D-2013-NakanoOM #3d #artificial reality #using
Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
HCIHIMI-D-2013-ShengLD #comprehension #eye tracking #using
Eyes Don’t Lie: Understanding Users’ First Impressions on Websites Using Eye Tracking (HS, NSL, SD), pp. 635–641.
HCIHIMI-D-2013-SugayaSNT #recognition #using
Basic Investigation into Hand Shape Recognition Using Colored Gloves Taking Account of the Peripheral Environment (TS, TS, HN, HT), pp. 133–142.
HCIHIMI-D-2013-UedaA #people #predict #using
Prediction of the Concern of People Using CGM (YU, YA), pp. 284–292.
HCIHIMI-D-2013-YanagimotoSY #classification #estimation #network #sentiment #using #word
Word Classification for Sentiment Polarity Estimation Using Neural Network (HY, MS, AY), pp. 669–677.
HCIHIMI-HSM-2013-Campbell #safety #simulation #using
Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
HCIHIMI-HSM-2013-ChunJHJSLCJ #natural language #using
Pathway Construction and Extension Using Natural Language Processing (HWC, SJJ, MNH, CHJ, SKS, SL, SPC, HJ), pp. 32–38.
HCIHIMI-HSM-2013-DamrongratKI #multi #ontology #representation #simulation #using
Increasing Situational Awareness of Indoor Emergency Simulation Using Multilayered Ontology-Based Floor Plan Representation (CD, HK, MI), pp. 39–45.
HCIHIMI-HSM-2013-KimuraHTN #evaluation #performance #using
Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
HCIHIMI-HSM-2013-LeaN #framework #performance #quality #research #usability
Usability of Performance Dashboards, Usefulness of Operational and Tactical Support, and Quality of Strategic Support: A Research Framework (BRL, FFHN), pp. 116–123.
HCIHIMI-HSM-2013-LeeJ #analysis #simulation #using
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-MiyataWI #development #using
Development of a Chest X-ray Examination Support System for Foreigners Using a Personal Digital Assistant (MM, CW, MI), pp. 285–290.
HCIHIMI-HSM-2013-MizutaniKSASUKSI #development #eye tracking #visual notation
Development of Screening Visual Field Test Application that Use Eye Movement (MM, KK, SS, TA, TS, MU, SK, MS, TI), pp. 291–300.
HCIHIMI-HSM-2013-SaitohI #detection #learning #using #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HCIHIMI-HSM-2013-SakuradaH #interface #physics #using
A New Presence Display System Using Physical Interface Running on IP-Phones (TS, YH), pp. 411–420.
HCIHIMI-HSM-2013-SasakiHAI #simulation #using
Train Ride Simulation Using Assist Strap Device (TS, KH, TA, YI), pp. 189–197.
HCIHIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation
Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HCIHIMI-LCCB-2013-AntolosLLV #analysis #using
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-BrynielssonJL #communication #design #process #prototype #social #social media #using #video
Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool (JB, FJ, SL), pp. 559–568.
HCIHIMI-LCCB-2013-Hirasawa #challenge #development #embedded #quality
Challenges for Incorporating “Quality in Use” in Embedded System Development (NH), pp. 467–474.
HCIHIMI-LCCB-2013-ItaiEM #design
Design of Space for Expression Media with the Use of Fog (SI, YE, YM), pp. 210–218.
HCIHIMI-LCCB-2013-KometaniTFA #education #feedback #student #using #video
Video Feedback System for Teaching Improvement Using Students’ Sequential and Overall Teaching Evaluations (YK, TT, TF, TA), pp. 79–88.
HCIHIMI-LCCB-2013-NahTRV #education #game studies #gamification #using
Gamification of Education Using Computer Games (FFHN, VRT, SR, PRV), pp. 99–107.
HCIHIMI-LCCB-2013-NakaI #3d #communication #gesture #using #web
Consideration of the Effect of Gesture Exaggeration in Web3D Communication Using 3DAgent (TN, TI), pp. 511–520.
HCIHIMI-LCCB-2013-TakahashiA #mining #using
User Needs Search Using Text Mining (YT, YA), pp. 607–615.
HCIHIMI-LCCB-2013-YoshidaOSNSH #assessment #comprehension #concept #using
Instantaneous Assessment of Learners’ Comprehension for Lecture by Using Kit-Build Concept Map System (KY, TO, KS, YN, MS, TH), pp. 175–181.
HCIOCSC-2013-BourimiK #case study #collaboration #community #experience #online #using
Experiences by Using AFFINE for Building Collaborative Applications for Online Communities (MB, DK), pp. 345–354.
HCIOCSC-2013-FardounZC #collaboration #education #facebook #process #using
Using Facebook for Collaborative Academic Activities in Education (HMF, BZ, APC), pp. 137–146.
HCIOCSC-2013-KashimaMM #content management #using
Effects of Sharing Farmers’ Information Using Content Management System (TK, SM, TM), pp. 296–303.
HCIOCSC-2013-SaY #motivation #people #social #what
What Motivates People Use Social Tagging (NS, XY), pp. 86–93.
HCIOCSC-2013-ShabgahiSC #bibliography #comparative #education #microblog #research
A Comparative Review of Research Literature on Microblogging Use and Risk in Organizational and Educational Settings (SLS, NAKS, AMC), pp. 174–181.
HCIOCSC-2013-WangA #network #social
Adult Learners and Their Use of Social Networking Sites (Y(W, JA), pp. 222–229.
HCIOCSC-2013-YuanOXS #bibliography #classification #sentiment #using #web
Sentiment Classification of Web Review Using Association Rules (MY, YO, ZX, HS), pp. 442–450.
VISSOFTVISSOFT-2013-GouveiaCA #fault #html #locality #using #visualisation
Using HTML5 visualizations in software fault localization (CG, JC, RA), pp. 1–10.
VISSOFTVISSOFT-2013-Wehrwein #lightweight #matrix #reverse engineering #using #visualisation
Lightweight software reverse engineering using augmented matrix visualizations (BW), pp. 1–4.
AdaEuropeAdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety #using
Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
HILTHILT-2013-CourtieuACZRBHG #coq #formal method #runtime #semantics #towards #using
Towards the formalization of SPARK 2014 semantics with explicit run-time checks using coq (PC, MVA, TC, ZZ, R, JB, JH, JG, TJ), pp. 21–22.
HILTHILT-2013-LarsonHFD #fault #modelling #safety #using
Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
HILTHILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability #using
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
CAiSECAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net #using
Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #trust #using
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOCEDOC-2013-PlataniotisKP #architecture #design #enterprise #graph #using
Relating Decisions in Enterprise Architecture Using Decision Design Graphs (GP, SdK, HAP), pp. 139–146.
EDOCEDOC-2013-SelwayGMS #approach #formal method #natural language #specification #using
Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management #using
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEISICEIS-J-2013-KalsingITN13a #incremental #legacy #mining #modelling #process #using
Re-learning of Business Process Models from Legacy System Using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 314–330.
ICEISICEIS-v1-2013-ChiuFW #analysis #collaboration #integration #performance #social
An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
ICEISICEIS-v1-2013-DombiD #modelling #using
Modelling Complex Systems using the Pliant Cognitive Map (JDD, JD), pp. 506–512.
ICEISICEIS-v1-2013-HendersonL #multi #question
Are Multi-way Joins Actually Useful? (MH, RL), pp. 13–22.
ICEISICEIS-v1-2013-IsmailHQDE #clustering #evaluation #query #simulation #using
Clustering using Hypergraph for P2P Query Routing — Simulation and Evaluation (AI, MH, MQ, ND, MES), pp. 247–254.
ICEISICEIS-v1-2013-MaghrabyFRA #grid #image #retrieval #using
A Grid based Medical Image Retrieval System using Alchemi (FM, HMF, MR, MA), pp. 224–230.
ICEISICEIS-v1-2013-MoritaN #classification #using
Classification Model using Contrast Patterns (HM, MN), pp. 334–339.
ICEISICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear #using
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-SimrinAD #heuristic #problem #using
A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEISICEIS-v2-2013-KalsingITN #incremental #learning #legacy #mining #modelling #process #using
Evolutionary Learning of Business Process Models from Legacy Systems using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 58–69.
ICEISICEIS-v2-2013-LiL #agile #network #object-oriented #predict #process #using
Predicting Fault-proneness of Object-Oriented System Developed with Agile Process using Learned Bayesian Network (LL, HL), pp. 5–16.
ICEISICEIS-v2-2013-Milosz #case study #enterprise #legacy #performance #testing #using
Performance Testing of New Enterprise Applications using Legacy Load Data — A HIS Case Study (MM), pp. 151–156.
ICEISICEIS-v2-2013-OliveiraS #aspect-oriented #modelling #requirements #using
Modeling Aspects in Requirements using SysML Extensions (KSdO, MdSS), pp. 126–133.
ICEISICEIS-v2-2013-PradoB #evolution #using
Perspectives on using Actor-Network Theory and Organizational Semiotics to Address Organizational Evolution (ABP, MCCB), pp. 173–181.
ICEISICEIS-v2-2013-SantaN #framework #learning #modelling #using
Modeling the Creation of a Learning Organization by using the Learning Organization Atlas Framework (MS, SN), pp. 278–285.
ICEISICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework #using
Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, ), pp. 427–434.
ICEISICEIS-v2-2013-TounsiHKKD #design pattern #modelling #specification #using
Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns (IT, ZH, MHK, AHK, KD), pp. 294–301.
ICEISICEIS-v3-2013-ChinoRAOGTT #collaboration #framework #gesture #information management #interactive #using
The NInA Framework — Using Gesture to Improve Interaction and Collaboration in Geographical Information Systems (DYTC, LASR, LPSA, WDO, RRdVG, CTJ, AJMT), pp. 58–66.
ICEISICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #using #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling #using
A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEISICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #using #web
Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKMCIKM-2013-AyadiTDJH #correlation #image #modelling #query #retrieval #using
Correlating medical-dependent query features with image retrieval models using association rules (HA, MT, MD, MBJ, JXH), pp. 299–308.
CIKMCIKM-2013-ChanLKLBR #graph #matrix #using
Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation (JC, WL, AK, CL, JB, KR), pp. 811–816.
CIKMCIKM-2013-ChenMLHCG #topic #using
Discovering coherent topics using general knowledge (ZC, AM, BL, MH, MC, RG), pp. 209–218.
CIKMCIKM-2013-ChuklinSHSR #using
Evaluating aggregated search using interleaving (AC, AS, KH, PS, MdR), pp. 669–678.
CIKMCIKM-2013-HermanssonKJJD #ambiguity #graph #kernel #using
Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
CIKMCIKM-2013-KharitonovMSO #using
Using historical click data to increase interleaving sensitivity (EK, CM, PS, IO), pp. 679–688.
CIKMCIKM-2013-NguyenLT #code review #performance #set #using
Using micro-reviews to select an efficient set of reviews (TSN, HWL, PT), pp. 1067–1076.
CIKMCIKM-2013-ShirakawaNHN #metric #probability #semantics #similarity #using #wiki
Probabilistic semantic similarity measurements for noisy short texts using Wikipedia entities (MS, KN, TH, SN), pp. 903–908.
CIKMCIKM-2013-SordoniHN #information retrieval #interactive #modelling #quantum #topic #using
Modeling latent topic interactions using quantum interference for information retrieval (AS, JH, JYN), pp. 1197–1200.
CIKMCIKM-2013-VanderbauwhedeFACM #throughput #using
High throughput filtering using FPGA-acceleration (WV, AF, LA, SRC, MM), pp. 1245–1248.
CIKMCIKM-2013-WijayaTM #named #ontology #using #web
PIDGIN: ontology alignment using web text as interlingua (DTW, PPT, TMM), pp. 589–598.
ECIRECIR-2013-AlhindiKF #case study #interactive #summary #using
A Pilot Study on Using Profile-Based Summarisation for Interactive Search Assistance (AA, UK, CF), pp. 672–675.
ECIRECIR-2013-AnderssonMHR #retrieval #using
Exploring Patent Passage Retrieval Using Nouns Phrases (LA, PM, AH, AR), pp. 676–679.
ECIRECIR-2013-ChenC #analysis #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-ChuklinSR #behaviour #using
Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
ECIRECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics #using
Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIRECIR-2013-JeongM #classification #dependence #recognition #using
Using WordNet Hypernyms and Dependency Features for Phrasal-Level Event Recognition and Type Classification (YJ, SHM), pp. 267–278.
ECIRECIR-2013-LagnierDGG #information management #network #predict #social #using
Predicting Information Diffusion in Social Networks Using Content and User’s Profiles (CL, LD, ÉG, PG), pp. 74–85.
ECIRECIR-2013-MorenoD #clustering #image #interface #mobile #using #web
Using Text-Based Web Image Search Results Clustering to Minimize Mobile Devices Wasted Space-Interface (JGM, GD), pp. 532–544.
ECIRECIR-2013-NguyenTT #classification #learning #rank #using
Folktale Classification Using Learning to Rank (DN, DT, MT), pp. 195–206.
ECIRECIR-2013-RaiberK #effectiveness #metric #predict #using
Using Document-Quality Measures to Predict Web-Search Effectiveness (FR, OK), pp. 134–145.
ICMLICML-c1-2013-ChenLYY #functional #matrix #using
General Functional Matrix Factorization Using Gradient Boosting (TC, HL, QY, YY), pp. 436–444.
ICMLICML-c1-2013-GilboaSCG #approximate #multi #process #scalability #using
Scaling Multidimensional Gaussian Processes using Projected Additive Approximations (EG, YS, JPC, EG), pp. 454–461.
ICMLICML-c1-2013-LiLSHD #generative #learning #using
Learning Hash Functions Using Column Generation (XL, GL, CS, AvdH, ARD), pp. 142–150.
ICMLICML-c1-2013-WulsinFL #correlation #markov #parsing #process #using
Parsing epileptic events using a Markov switching process model for correlated time series (DW, EBF, BL), pp. 356–364.
ICMLICML-c3-2013-HockingRVB #detection #learning #using
Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICMLICML-c3-2013-IshtevaPS #order #using
Unfolding Latent Tree Structures using 4th Order Tensors (MI, HP, LS), pp. 316–324.
ICMLICML-c3-2013-WanZZLF #network #using
Regularization of Neural Networks using DropConnect (LW, MDZ, SZ, YL, RF), pp. 1058–1066.
KDDKDD-2013-AltinigneliPB #parallel #using
Massively parallel expectation maximization using graphics processing units (MCA, CP, CB), pp. 838–846.
KDDKDD-2013-JhaSP #algorithm #performance #streaming #using
A space efficient streaming algorithm for triangle counting using the birthday paradox (MJ, CS, AP), pp. 589–597.
KDDKDD-2013-JinSSBWR #modelling #named #using
Forex-foreteller: currency trend modeling using news articles (FJ, NS, PS, PB, WW, NR), pp. 1470–1473.
KDDKDD-2013-KuoYHKL #network #predict #social #statistics #using
Unsupervised link prediction using aggregative statistics on heterogeneous social networks (TTK, RY, YYH, PHK, SDL), pp. 775–783.
KDDKDD-2013-LeeAC #realtime #twitter #using
Real-time disease surveillance using Twitter data: demonstration on flu and cancer (KL, AA, ANC), pp. 1474–1477.
KDDKDD-2013-LiuYK #adaptation #modelling #process #using
Adaptive collective routing using gaussian process dynamic congestion models (SL, YY, RK), pp. 704–712.
KDDKDD-2013-LuceyOCRM #using
Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
KDDKDD-2013-MukherjeeKLWHCG #behaviour #using
Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
KDDKDD-2013-Neumann #big data #problem #using
Using “big data” to solve “small data” problems (CN), p. 1140.
KDDKDD-2013-RaederPDSP #clustering #reduction #scalability #using
Scalable supervised dimensionality reduction using clustering (TR, CP, BD, OS, FJP), pp. 1213–1221.
KDDKDD-2013-StitelmanPDHRP #detection #network #online #scalability #using
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDDKDD-2013-Vatsavai #approach #learning #multi #using
Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDDKDD-2013-WangS #classification #multi #relational #social #using
Multi-label relational neighbor classification using social context features (XW, GS), pp. 464–472.
KDIRKDIR-KMIS-2013-AlwazaePK #classification #verification
Verifying the Usefulness of a Classification System of Best Practices (MMSA, EP, HK), pp. 405–412.
KDIRKDIR-KMIS-2013-BaliBBG #information management #tool support #using
Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
KDIRKDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax #using
Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-DuarteFD #clustering #constraints #using #validation
Data Clustering Validation using Constraints (JMMD, ALNF, FJFD), pp. 17–27.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-ItalaH #behaviour #diagrams #process #using
Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
KDIRKDIR-KMIS-2013-Lindner #constraints #parsing #random #using
Using Conditional Random Fields with Constraints to Train Support Vector Machines — Locating and Parsing Bibliographic References (SL), pp. 28–36.
KDIRKDIR-KMIS-2013-NartTF #automation #personalisation #recommendation #using
Personalized Recommendation and Explanation by using Keyphrases Automatically extracted from Scientific Literature (DDN, CT, FF), pp. 96–103.
KDIRKDIR-KMIS-2013-RauchS #case study #mining #using
Using Domain Knowledge in Association Rules Mining — Case Study (JR, MS), pp. 104–111.
KDIRKDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification #using
Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
KDIRKDIR-KMIS-2013-SousaM #tool support #web
Diagnosis of the Use of Web 2.0 Tools in the Portuguese Financial Institutions (CS, PM), pp. 368–372.
KDIRKDIR-KMIS-2013-SucaS #approach #documentation #ontology #using
An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEODKEOD-2013-AlirezaieL #abduction #automation #data type #reasoning #using
Automatic Annotation of Sensor Data Streams using Abductive Reasoning (MA, AL), pp. 345–354.
KEODKEOD-2013-CostaFML #approach #classification #information management #ontology #using
Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEODKEOD-2013-DaramolaAAO #information management #ontology #using
Using Ontology-based Information Extraction for Subject-based Auto-grading (JOD, IA, IA, OOO), pp. 373–378.
KEODKEOD-2013-TimonenPT #fuzzy #modelling #ontology #safety #using
Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
KEODKEOD-2013-ZouhaierDA #automation #generative #reasoning #using
Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
MLDMMLDM-2013-AmalamanER #detection #using
Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDMMLDM-2013-CastroSAE #automation #classification #database #using #web
Automatic Classification of Web Databases Using Domain-Dictionaries (HMMC, VJSS, ILA, HJEB), pp. 340–351.
MLDMMLDM-2013-DincA #classification #evaluation #image #random #using
Evaluation of Hyperspectral Image Classification Using Random Forest and Fukunaga-Koontz Transform (SD, RSA), pp. 234–245.
MLDMMLDM-2013-GaoD #data mining #distributed #mining #performance #using
Improving the Efficiency of Distributed Data Mining Using an Adjustment Work Flow (JG, JD), pp. 69–83.
MLDMMLDM-2013-LeeBZ #fuzzy #logic #multi #summary #topic #using
Multi-document Text Summarization Using Topic Model and Fuzzy Logic (SL, SB, YZ), pp. 159–168.
MLDMMLDM-2013-ParraL #clustering #dataset #using
Unsupervised Tagging of Spanish Lyrics Dataset Using Clustering (FLP, EL), pp. 130–143.
MLDMMLDM-2013-PohlZ #automation #n-gram #recognition #speech #using
Using Part of Speech N-Grams for Improving Automatic Speech Recognition of Polish (AP, BZ), pp. 492–504.
MLDMMLDM-2013-PrieditisL #bound #classification #performance #problem #using
When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
RecSysRecSys-2013-AdamopoulosT #collaboration #predict #recommendation #using
Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSysRecSys-2013-AlanaziB #markov #modelling #recommendation #using
A people-to-people content-based reciprocal recommender using hidden markov models (AA, MB), pp. 303–306.
RecSysRecSys-2013-HammarKN #e-commerce #recommendation #using
Using maximum coverage to optimize recommendation systems in e-commerce (MH, RK, BJN), pp. 265–272.
RecSysRecSys-2013-KaminskasRS #hybrid #music #recommendation #using
Location-aware music recommendation using auto-tagging and hybrid matching (MK, FR, MS), pp. 17–24.
RecSysRecSys-2013-KhroufT #hybrid #linked data #open data #recommendation #using
Hybrid event recommendation using linked data and user diversity (HK, RT), pp. 185–192.
RecSysRecSys-2013-KucharK #case study #learning #named #web #web service
GAIN: web service for user tracking and preference learning — a smart TV use case (JK, TK), pp. 467–468.
RecSysRecSys-2013-LiuAYB #generative #using
Generating supplemental content information using virtual profiles (HL, MSA, BY, AB), pp. 295–302.
RecSysRecSys-2013-NatarajanSD #collaboration
Which app will you use next?: collaborative filtering with interactional context (NN, DS, ISD), pp. 201–208.
RecSysRecSys-2013-OstrikovRS #collaboration #metadata #using
Using geospatial metadata to boost collaborative filtering (AO, LR, BS), pp. 423–426.
RecSysRecSys-2013-SchelterBSAM #distributed #matrix #pipes and filters #using
Distributed matrix factorization with mapreduce using a series of broadcast-joins (SS, CB, MS, AA, VM), pp. 281–284.
RecSysRecSys-2013-TianJ #graph #recommendation #using
Recommending scientific articles using bi-relational graph-based iterative RWR (GT, LJ), pp. 399–402.
RecSysRecSys-2013-ZhangSKH #artificial reality #recommendation #using
Improving augmented reality using recommender systems (ZZ, SS, SRK, PH), pp. 173–176.
SEKESEKE-2013-Al-JamimiA #design pattern #detection #prolog #using
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S) (HAAJ, MAA), pp. 727–730.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-AlviD #classification #fuzzy #image #using
Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
SEKESEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface #using
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-AsuncionSPPDM #information management #using
Using Change Entries to Collect Software Project Information (HUA, MS, RP, KP, ND, WJMJ), pp. 184–189.
SEKESEKE-2013-CorralSS #mobile #quality #using
Using a Partially Instantiated GQM to Measure the Quality of Mobile Applications (S) (LC, AS, GS), pp. 520–524.
SEKESEKE-2013-DelfimG #coordination #mining #multi #slicing #using
Multiple Coordinated Views to Support Aspect Mining Using Program Slicing (S) (FMD, REG), pp. 531–536.
SEKESEKE-2013-DengWH #algorithm #combinator #identification #multi #using
Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
SEKESEKE-2013-JulianoTSM #assessment #automation #case study #complexity #similarity
Automated Computation of Use Cases Similarity can Aid the Assessment of Cohesion and Complexity of Classes (S) (RCJ, BANT, MSS, MdAM), pp. 494–499.
SEKESEKE-2013-Kung #case study #identification #on the
On Use Case Identification (DCK), pp. 759–764.
SEKESEKE-2013-Lou0 #artificial reality #gesture #interactive #personalisation #realtime #using
A Real-time Personalized Gesture Interaction System Using Wii Remote and Kinect for Tiled-Display Environment (YL, WW), pp. 131–136.
SEKESEKE-2013-MaffortVBHAM #design pattern #mining #using
Mining Architectural Patterns Using Association Rules (CAM, MTV, RdSB, AH, NA, JM), pp. 375–380.
SEKESEKE-2013-MarcalGCJ #identification #mining #repository #using
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (S) (IM, REG, RCMC, COJ), pp. 338–343.
SEKESEKE-2013-MarcolinoOGM #approach #case study #effectiveness #towards #variability
Towards the Effectiveness of a Variability Management Approach at Use Case Level (AM, EAOJ, IMSG, JCM), pp. 214–219.
SEKESEKE-2013-MoshirpourEF #approach #automation #ontology #using
Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (S) (MM, AE, BHF), pp. 63–66.
SEKESEKE-2013-ShahinLL #architecture #concept #documentation #using
Recovering Software Architectural Knowledge from Documentation using Conceptual Model (MS, PL, ZL), pp. 556–561.
SEKESEKE-2013-ShamsHK #estimation #network #using
Software Effort Estimation using Regularized Radial Basis Function Neural Networks (KMS, HSH, AK), pp. 473–478.
SEKESEKE-2013-SouzaSPFF #case study #generative #using
Generation of Thematic Maps using WPS-Cartographer: An experimental study (S) (FCMS, ACCdS, VP, EF, VRTF), pp. 500–503.
SEKESEKE-2013-SunSJ #architecture #maintenance #using
Using Architecture to Support the Collaborations in Software Maintenance (YS, HS, WJ), pp. 362–357.
SEKESEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing #using
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SEKESEKE-2013-ZhangLK #debugging #on the #statistics
On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
SIGIRSIGIR-2013-AgeevLA #behaviour #summary #using
Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
SIGIRSIGIR-2013-AlyHD #named #using
Taily: shard selection using the tail of score distributions (RA, DH, TD), pp. 673–682.
SIGIRSIGIR-2013-BouadjenekHBV #documentation #personalisation #representation #social #using
Using social annotations to enhance document representation for personalized search (MRB, HH, MB, AV), pp. 1049–1052.
SIGIRSIGIR-2013-GaoXX #query #random #using
Query expansion using path-constrained random walks (JG, GX, JX), pp. 563–572.
SIGIRSIGIR-2013-HassanWW #query #self #towards #using
Toward self-correcting search engines: using underperforming queries to improve search (AHA, RWW, YMW), pp. 263–272.
SIGIRSIGIR-2013-LeeC #social #social media #using #web
Building a web test collection using social media (CJL, WBC), pp. 757–760.
SIGIRSIGIR-2013-MahdabiGHC #ambiguity #concept #proximity #query #retrieval #using
Leveraging conceptual lexicon: query disambiguation using proximity information for patent retrieval (PM, SG, JXH, FC), pp. 113–122.
SIGIRSIGIR-2013-MaxwellC #query #topic #using
Compact query term selection using topically related text (KTM, WBC), pp. 583–592.
SIGIRSIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback #using
An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIRSIGIR-2013-RaiberK #clustering #documentation #markov #random #ranking #using
Ranking document clusters using markov random fields (FR, OK), pp. 333–342.
SIGIRSIGIR-2013-Rodriguez-VaamondeTF #documentation #image #using #web #what
What can pictures tell us about web pages?: improving document search using images (SRV, LT, AWF), pp. 849–852.
SIGIRSIGIR-2013-RossiMCS #performance #query #using
Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
SIGIRSIGIR-2013-SappelliVK #personalisation #recommendation #using
Recommending personalized touristic sights using google places (MS, SV, WK), pp. 781–784.
SIGIRSIGIR-2013-SekiM #feedback #social #using
Finding impressive social content creators: searching for SNS illustrators using feedback on motifs and impressions (YS, KM), pp. 1041–1044.
SIGIRSIGIR-2013-WangZS #modelling #semantics #topic #using
Semantic hashing using tags and topic modeling (QW, DZ, LS), pp. 213–222.
SIGIRSIGIR-2013-Wu #behaviour #how #online #predict #using
How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
SIGIRSIGIR-2013-Yeniterzi #effectiveness #social #social media #using
Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
SKYSKY-2013-GarzonSK #elicitation #re-engineering
Knowledge Re-use and Dissemination for Resource Elicitation in Software Engineering (MHG, CS, JK), pp. 14–23.
SKYSKY-2013-Gomes #how #ontology #recommendation #representation #using
Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
SKYSKY-2013-RineF #complexity #information management #metric #quality #representation #requirements #using
Requirements Quality Knowledge Representation using Chunking Complexity Measurement: Prior to Formal Inspections (DCR, AF), pp. 3–13.
SKYSKY-2013-SuarezMFM #automation #generative #natural language #semantics #using
Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
AMTAMT-2013-FinotMSD #metamodelling #testing #using
Using Meta-model Coverage to Qualify Test Oracles (OF, JMM, GS, TD), pp. 12–21.
ECMFAECMFA-2013-AmbertBLLP #approach #modelling #testing
Applying a Def-Use Approach on Signal Exchange to Implement SysML Model-Based Testing (FA, FB, JL, BL, FP), pp. 134–151.
ECMFAECMFA-2013-SunCDF #using
Using Model Types to Support Contract-Aware Model Substitutability (WS, BC, SD, RBF), pp. 118–133.
ICMTICMT-2013-HermannGNBMPE #automation #graph grammar #on the #using
On an Automated Translation of Satellite Procedures Using Triple Graph Grammars (FH, SG, NN, BB, GM, AP, TE), pp. 50–51.
MODELSMoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml #using
Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving #using
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MODELSMoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing #using
Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
MODELSMoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml #using
Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
MODELSMoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml #using
Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving #using
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MODELSMoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing #using
Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
MODELSMoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml #using
Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
ECOOPECOOP-2013-AnsaloniKZBBT #composition #java #program analysis #tool support #virtual machine
Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine (DA, SK, YZ, LB, WB, PT), pp. 352–377.
OOPSLAOOPSLA-2013-ShiBH #optimisation #using
Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
GPCEGPCE-2013-GerakiosBS #java #parametricity #using
Reified type parameters using Java annotations (PG, AB, YS), pp. 61–64.
GPCEGPCE-2013-KramerOKC #product line #user interface #using
Using document-oriented GUIs in dynamic software product lines (DK, SO, PK, TC), pp. 85–94.
PPDPPPDP-2013-MontenegroPS #analysis #functional #regular expression #using
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
PADLPADL-2013-MachadoAD #declarative #parallel #performance #programming #using
Parallel Performance of Declarative Programming Using a PGAS Model (RM, SA, DD), pp. 244–260.
PADLPADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi #using
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
POPLPOPL-2013-UpadrastaC #scheduling #using
Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
RERE-2013-Cleland-HuangCH #design #empirical #requirements #using
Using tracelab to design, execute, and baseline empirical requirements engineering experiments (JCH, AC, JHH), pp. 338–339.
RERE-2013-FeldererB #fault #industrial #requirements #taxonomy #using #validation
Using defect taxonomies for requirements validation in industrial projects (MF, AB), pp. 296–301.
RERE-2013-WangLWYZL #debugging #dependence #integration #network #question #requirements
Can requirements dependency network be used as early indicator of software integration bugs? (JW, JL, QW, DY, HZ, ML), pp. 185–194.
REFSQREFSQ-2013-BonBGALTBFGATA #analysis #case study #requirements
Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
REFSQREFSQ-2013-BreauxG #analysis #requirements #specification #traceability #using
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
REFSQREFSQ-2013-FerrariGT #clustering #documentation #natural language #requirements #using
Using Clustering to Improve the Structure of Natural Language Requirements Documents (AF, SG, GT), pp. 34–49.
SACSAC-2013-AlnusairZY #automation #design #recognition #semantics #using
Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
SACSAC-2013-AraujoGA #artificial reality #identification #towards #using
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SACSAC-2013-BanerjeeSS #detection #monitoring #using
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SACSAC-2013-BlondelSU #classification #constraints #learning #using
Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
SACSAC-2013-CamposFHV #personalisation #query #ranking #using #xml
XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SACSAC-2013-CapelleHHF #recommendation #semantics #using
Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
SACSAC-2013-ChanHN #layout #semantics #using #wiki #word
Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
SACSAC-2013-ChocklerIMRS #satisfiability #using
Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
SACSAC-2013-CohenA #composition #refactoring
Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
SACSAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements
On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
SACSAC-2013-DugerdilS #legacy
Dynamic decision tree for legacy use-case recovery (PD, DS), pp. 1284–1291.
SACSAC-2013-GrueauA #modelling #towards
Towards a domain specific modeling language for agent-based models in land use science (CG, JA), pp. 83–85.
SACSAC-2013-HeckelerSK #component #execution #robust #testing #using
Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
SACSAC-2013-InzingerHSLD #identification #implementation #using
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SACSAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling #using
Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
SACSAC-2013-JungWKO #architecture #automation #interactive #using
Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
SACSAC-2013-KalyanC #analysis #navigation #using
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KannanMDS #navigation #predict #using
Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
SACSAC-2013-KimHCYWNPC #similarity #using
Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
SACSAC-2013-KimM #algorithm #detection #hybrid #search-based #using
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SACSAC-2013-LeitaoC #adaptation #detection #optimisation #performance #using #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SACSAC-2013-LeoniA #mining #process #using
Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
SACSAC-2013-MadeoLP #gesture #rest #segmentation #using
Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
SACSAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-MehtaRCN #approach #dependence #using
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SACSAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech #using
A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
SACSAC-2013-MendesW #navigation #realtime #using
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SACSAC-2013-PapadakisT #classification #mutation testing #testing #using
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SACSAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #using #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SACSAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction #using
Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
SACSAC-2013-Sobieski0 #maude #sql #term rewriting #using
Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
SACSAC-2013-SrivastavaSM #clustering #graph #using
Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
SACSAC-2013-TeixeiraRG #detection #locality #parallel #using
Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SACSAC-2013-TragatschnigZ #enterprise #integration #using
Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #analysis #data flow #using
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-InozemtsevaHH #fault #reduction #using
Using fault history to improve mutation reduction (LI, HH, RH), pp. 639–642.
ESEC-FSEESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation #using
Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
ESEC-FSEESEC-FSE-2013-Lopez #ecosystem #evolution #modelling #topic #using
Using topic models to understand the evolution of a software ecosystem (NL), pp. 723–726.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-BouwersDV #case study #experience #industrial #metric
Evaluating usefulness of software metrics: an industrial experience report (EB, AvD, JV), pp. 921–930.
ICSEICSE-2013-GargIBMG #c #c++ #execution #generative #testing #using
Feedback-directed unit test generation for C/C++ using concolic execution (PG, FI, GB, NM, AG), pp. 132–141.
ICSEICSE-2013-HaoLHG #energy #mobile #program analysis #using
Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSEICSE-2013-JohnsonSMB #debugging #developer #question #static analysis #tool support #why
Why don’t software developers use static analysis tools to find bugs? (BJ, YS, ERMH, RWB), pp. 672–681.
ICSEICSE-2013-Jonsson #machine learning #performance #scalability #using
Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
ICSEICSE-2013-PaasivaaraLDRS #agile #distributed #education #re-engineering #student #using
Teaching students global software engineering skills using distributed scrum (MP, CL, DD, PR, AS), pp. 1128–1137.
ICSEICSE-2013-PanichellaDOPPL #algorithm #approach #effectiveness #how #modelling #re-engineering #search-based #topic
How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
ICSEICSE-2013-Rimba #assurance #security #using
Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
ICSEICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSEICSE-2013-Souza #predict #using
A proposal for the improvement of project’s cost predictability using EVM and historical data of cost (ADdS), pp. 1447–1449.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
SLESLE-2013-DialloCL #approach #formal method #modelling #using
A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOSASPLOS-2013-AhnDT #alias #named #using
DeAliaser: alias speculation using atomic region support (WA, YD, JT), pp. 167–180.
ASPLOSASPLOS-2013-CuiHWY #execution #symbolic computation #using #verification
Verifying systems rules using rule-directed symbolic execution (HC, GH, JW, JY), pp. 329–342.
ASPLOSASPLOS-2013-KadavRS #fault tolerance #fine-grained #using
Fine-grained fault tolerance using device checkpoints (AK, MJR, MMS), pp. 473–484.
ASPLOSASPLOS-2013-SahooCGA #automation #fault #invariant #locality #using
Using likely invariants for automated software fault localization (SKS, JC, CG, VSA), pp. 139–152.
CCCC-2013-MooreC #automation #generative #machine learning #policy #using
Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
CGOCGO-2013-BardizbanyanGWSLMS #data access #performance #using
Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
CGOCGO-2013-HuangJBJA #automation #parallel #runtime #using
Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
CGOCGO-2013-KulkarniCWS #automation #heuristic #machine learning #using
Automatic construction of inlining heuristics using machine learning (SK, JC, CW, DS), p. 12.
HPCAHPCA-2013-ArdestaniR #manycore #named #performance #using
ESESC: A fast multicore simulator using Time-Based Sampling (EKA, JR), pp. 448–459.
HPCAHPCA-2013-GoswamiCL #architecture #memory management #throughput #using
Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
HPCAHPCA-2013-KhanAWKJ #architecture #manycore #performance #using
Improving multi-core performance using mixed-cell cache architecture (SMK, ARA, CW, JK, DAJ), pp. 119–130.
HPCAHPCA-2013-KrishnaCKP #latency #using
Breaking the on-chip latency barrier using SMART (TK, CHOC, WCK, LSP), pp. 378–389.
HPCAHPCA-2013-SudanBLXMLB #architecture #lightweight #novel #using #web
A novel system architecture for web scale applications using lightweight CPUs and virtualized I/O (KS, SB, SL, MX, DM, GL, RB), pp. 167–178.
HPDCHPDC-2013-SuAWMWA #dataset #distributed #using
Taming massive distributed datasets: data sampling using bitmap indices (YS, GA, JW, KM, JW, JPA), pp. 13–24.
HPDCHPDC-2013-YinLBGN #dataset #order #performance #pipes and filters #using
Efficient analytics on ordered datasets using MapReduce (JY, YL, MB, LG, AN), pp. 125–126.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-KhudiaM #control flow #low cost #using
Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
LCTESLCTES-2013-WangCSCH #api #embedded #manycore #using
Portable mapping of openMP to multicore embedded systems using MCA APIs (CW, SC, PS, BMC, JH), pp. 153–162.
PPoPPPPoPP-2013-DiceLLLM #algorithm #hardware #memory management #transaction #using
Using hardware transactional memory to correct and simplify and readers-writer lock algorithm (DD, YL, YL, VL, MM), pp. 261–270.
PPoPPPPoPP-2013-EdmondsWL #algorithm #graph #using
Expressing graph algorithms using generalized active messages (NE, JW, AL), pp. 289–290.
SOSPSOSP-2013-RoyMZ #graph #named #streaming #using
X-Stream: edge-centric graph processing using streaming partitions (AR, IM, WZ), pp. 472–488.
CADECADE-2013-ClaessenJRS #automation #induction #proving #using
Automating Inductive Proofs Using Theory Exploration (KC, MJ, DR, NS), pp. 392–406.
CADECADE-2013-Filliatre #logic
One Logic to Use Them All (JCF), pp. 1–20.
CADECADE-2013-HawblitzelKLR #automation #proving #source code #theorem proving #towards #using
Towards Modularly Comparing Programs Using Automated Theorem Provers (CH, MK, SKL, HR), pp. 282–299.
CAVCAV-2013-BrimCDS #model checking #parametricity #probability #using
Exploring Parameter Space of Stochastic Biochemical Systems Using Quantitative Model Checking (LB, MC, SD, DS), pp. 107–123.
CAVCAV-2013-ChagantyLNR #learning #relational #smt #using
Combining Relational Learning with SMT Solvers Using CEGAR (ATC, AL, AVN, SKR), pp. 447–462.
CAVCAV-2013-ColangeBKT #diagrams #distributed #model checking #towards #using
Towards Distributed Software Model-Checking Using Decision Diagrams (MC, SB, FK, YTM), pp. 830–845.
CAVCAV-2013-LaarmanODLP #abstraction #automaton #manycore #using
Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction (AL, MCO, AED, KGL, JvdP), pp. 968–983.
CAVCAV-2013-PiskacWZ #automation #logic #smt #using
Automating Separation Logic Using SMT (RP, TW, DZ), pp. 773–789.
CAVCAV-2013-SosnovichGN #network #protocol #security #using
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
CSLCSL-2013-Rieg #using
Extracting Herbrand trees in classical realizability using forcing (LR), pp. 597–614.
ICLPICLP-J-2013-ArbelaezTC #parallel #predict #runtime #satisfiability #using
Using sequential runtime distributions for the parallel speedup prediction of SAT local search (AA, CT, PC), pp. 625–639.
ICLPICLP-J-2013-Balduccini
ASP with non-herbrand partial functions: a language and system for practical use (MB), pp. 547–561.
ICSTICST-2013-AfshanMS #evolution #natural language #string #testing #using
Evolving Readable String Test Inputs Using a Natural Language Model to Reduce Human Oracle Cost (SA, PM, MS), pp. 352–361.
ICSTICST-2013-ArafeenD #clustering #testing #using
Test Case Prioritization Using Requirements-Based Clustering (MJA, HD), pp. 312–321.
ICSTICST-2013-MossigeGM #constraints #generative #integration #programming #testing #using
Test Generation for Robotized Paint Systems Using Constraint Programming in a Continuous Integration Environment (MM, AG, HM), pp. 489–490.
ICSTICST-2013-TangHYW #metric #quality #using
Test Quality Measurement Using TBPP-R (JT, RH, JY, SW), pp. 48–55.
ICSTICST-2013-Torsel #domain-specific language #model checking #modelling #testing #using #web
A Testing Tool for Web Applications Using a Domain-Specific Modelling Language and the NuSMV Model Checker (AMT), pp. 383–390.
ICSTICST-2013-YeolekarUAKV #generative #model checking #scalability #testing #using
Scaling Model Checking for Test Generation Using Dynamic Inference (AY, DU, VA, SK, RV), pp. 184–191.
ICTSSICTSS-2013-BadriBF #case study #empirical #predict #testing
Predicting the Size of Test Suites from Use Cases: An Empirical Exploration (MB, LB, WF), pp. 114–132.
ICTSSICTSS-2013-EnoiuSP #diagrams #logic #testing #using
Using Logic Coverage to Improve Testing Function Block Diagrams (EPE, DS, PP), pp. 1–16.
ICTSSICTSS-2013-MauserKH #programming #towards #user interface #using
Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ICTSSICTSS-2013-SapraMCGC #execution #fault #python #source code #symbolic computation #using
Finding Errors in Python Programs Using Dynamic Symbolic Execution (SS, MM, SC, AG, EMC), pp. 283–289.
ICTSSICTSS-2013-StepienP #challenge #testing #using
Challenges of Testing Periodic Messages in Avionics Systems Using TTCN-3 (BS, LP), pp. 207–222.
ISSTAISSTA-2013-Buda #database #generative #testing #using
Generation of test databases using sampling methods (TSB), pp. 366–369.
ISSTAISSTA-2013-GligoricGZSAM #test coverage #testing #using
Comparing non-adequate test suites using coverage criteria (MG, AG, CZ, RS, MAA, DM), pp. 302–313.
ISSTAISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair #using
Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
LICSLICS-2013-Colcombet #logic #monad #set #word
Magnitude Monadic Logic over Words and the Use of Relative Internal Set Theory (TC), p. 123.
LICSLICS-2013-Halpern #first-order #logic #proving #security #using
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
RTARTA-2013-BaeEM #infinity #logic #model checking #using
Abstract Logical Model Checking of Infinite-State Systems Using Narrowing (KB, SE, JM), pp. 81–96.
ICSTSAT-2013-FingerLGS #constraints #probability #satisfiability #using
Solutions for Hard and Soft Constraints Using Optimized Probabilistic Satisfiability (MF, RL, CPG, BS), pp. 233–249.
TAPTAP-2013-InsaSR #algorithm #debugging #execution #using
Speeding Up Algorithmic Debugging Using Balanced Execution Trees (DI, JS, AR), pp. 133–151.
TLCATLCA-2013-SalvatiW #modelling #recursion #using
Using Models to Model-Check Recursive Schemes (SS, IW), pp. 189–204.
VMCAIVMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support #using
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
VMCAIVMCAI-2013-ZhengS0LD0 #network #partial order #reduction #using
State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
QoSAQoSA-2012-EklundB #architecture #ecosystem #framework #multi #using
Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
WICSA-ECSAWICSA-ECSA-2012-ElorantaHVK #architecture #documentation #generative #knowledge base #named #topic #using
TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents (VPE, OH, TV, KK), pp. 191–195.
WICSA-ECSAWICSA-ECSA-2012-MiesbauerW #architecture #information management #maintenance #using
Capturing and Maintaining Architectural Knowledge Using Context Information (CM, RW), pp. 206–210.
WICSA-ECSAWICSA-ECSA-2012-RathfelderBKR #email #monitoring #performance #predict #scalability #using
Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2012-ThatSO #design pattern #using
Using Architectural Patterns to Define Architectural Decisions (MTTT, SS, FO), pp. 196–200.
WICSA-ECSAWICSA-ECSA-2012-WoodsB #architecture #case study #experience #industrial #information management #scalability #using
Using an Architecture Description Language to Model a Large-Scale Information System — An Industrial Experience Report (EW, RB), pp. 239–243.
ASEASE-2012-AlmorsyGI #analysis #automation #using
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-AlmorsyGI12a #automation #re-engineering #using
Supporting automated software re-engineering using re-aspects (MA, JG, ASI), pp. 230–233.
ASEASE-2012-AmalfitanoFTCM #android #automation #testing #user interface #using
Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
ASEASE-2012-FaunesSB #algorithm #generative #model transformation #using
Generating model transformation rules from examples using an evolutionary algorithm (MF, HAS, MB), pp. 250–253.
ASEASE-2012-GopinathZK #effectiveness #fault #locality #specification #using
Improving the effectiveness of spectra-based fault localization using specifications (DG, RNZ, SK), pp. 40–49.
ASEASE-2012-HarmanLJWAC #challenge #programming #search-based #source code #using
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper) (MH, WBL, YJ, DRW, AA, JAC), pp. 1–14.
ASEASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to #using
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-KahkonenSH #automation #parallel #source code #testing #thread #using
Using unfoldings in automated testing of multithreaded programs (KK, OS, KH), pp. 150–159.
ASEASE-2012-LuCC #fault #learning #predict #reduction #using
Software defect prediction using semi-supervised learning with dimension reduction (HL, BC, MC), pp. 314–317.
ASEASE-2012-Lutz0D #collaboration #mobile #requirements #using
Using mobile devices for collaborative requirements engineering (RL, SS, SD), pp. 298–301.
ASEASE-2012-NijjarB #bound #smt #using #verification
Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
ASEASE-2012-RubinC #difference #set #using
Locating distinguishing features using diff sets (JR, MC), pp. 242–245.
CASECASE-2012-Chang #detection #fault #feature model #process #using
Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASECASE-2012-ChowdhuryTWSLG #automation #biology #using
Automated indirect transport of biological cells with optical tweezers using planar gripper formations (SC, AT, CW, PS, WL, SKG), pp. 267–272.
CASECASE-2012-DimitrovB #algorithm #evaluation #reduction #scheduling #search-based
Criteria evaluation considering the current time used by a genetic scheduling algorithm for changeover and tardiness reduction (TD, MB), pp. 425–430.
CASECASE-2012-DinhamF #detection #using
Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASECASE-2012-DotoliFIR #agile #modelling #simulation #using
A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASECASE-2012-FelekisWMRBSN #automation #using
Automated stiffness characterization of living tobacco BY2 cells using the Cellular Force Microscope (DF, AW, SM, ALRK, FB, RSS, BJN), pp. 285–290.
CASECASE-2012-FrankHEFDV #automation #modelling #realtime #requirements #using
Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems (TF, TH, KE, AF, CD, BVH), pp. 851–856.
CASECASE-2012-HeZWZ #identification #using
Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
CASECASE-2012-IsmailDH #higher-order #using
Observer-based trajectory tracking for a class of underactuated Lagrangian systems using higher-order sliding modes (RMTRI, TDN, QPH), pp. 1204–1209.
CASECASE-2012-JoKOO #feedback #using
Contact force control of a robotic hand using F/T sensory feedback with a rigid object (JJ, SKK, YO, SRO), pp. 436–441.
CASECASE-2012-JungCKM #detection #using
Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASECASE-2012-KawarazakiY #recognition #speech #using
Remote control system of home electrical appliances using speech recognition (NK, TY), pp. 761–764.
CASECASE-2012-KimKHHL #framework #using
A robot platform for unmanned weeding in a paddy field using sensor fusion (GHK, SCK, YKH, KSH, SGL), pp. 904–907.
CASECASE-2012-KimKS #algorithm #detection #recognition #using
Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASECASE-2012-KimKYOO #navigation #using
Actionable topological mapping for navigation using nearby objects (JK, JK, SY, YO, SO), pp. 1162–1167.
CASECASE-2012-KimYSP #detection #using #visual notation
Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASECASE-2012-KurzDP #using
Sampling Decision System in semiconductor manufacturing using Virtual Metrology (DK, CDL, JP), pp. 74–79.
CASECASE-2012-LeeB #execution #framework #lifecycle #simulation #using
Executable simulation lifecycle management framework using extensible and interoperable simulation language (HL, AB), pp. 237–242.
CASECASE-2012-LeeHJKL #matlab #simulation #using
Dynamic simulation of radial active magnetic bearing system for high speed rotor using ADAMS and MATLAB co-simulation (KCL, DKH, YHJ, CYK, MCL), pp. 880–885.
CASECASE-2012-LiK #automation #automaton #finite #generative #modelling #testing #using
Model-based automatic test generation for Simulink/Stateflow using extended finite automaton (ML, RK), pp. 857–862.
CASECASE-2012-LuiP #assembly #difference #evolution #flexibility #scheduling #using
Scheduling Flexible Assembly Lines using variants of Differential Evolution (WHVL, SGP), pp. 594–599.
CASECASE-2012-ParkBPB #development
Development of an anthropomorphic robot hand aimed at practical use for wide service robot application (SWP, JHB, JHP, MB), pp. 431–435.
CASECASE-2012-Ralston #automation #using
Automated longwall shearer horizon control using thermal infrared-based seam tracking (JCR), pp. 20–25.
CASECASE-2012-RyuOC #using
COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
CASECASE-2012-ShinPB #2d #3d #estimation #using
6DOF pose estimation using 2D-3D sensor fusion (YDS, JHP, MB), pp. 714–717.
CASECASE-2012-TangLY #nondeterminism #using
Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-WeiZW #detection #recognition #research
Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
CASECASE-2012-WuY #estimation #linear #markov #metric #using
State estimation for Markovian Jump Linear System using quantized measurements (HW, HY), pp. 527–531.
CASECASE-2012-ZhangWZX #fault #memory management #using
A dynamic memory model for mechanical fault diagnosis using one-class support vector machine (QZ, JW, JZ, GX), pp. 497–501.
CASECASE-2012-ZhaoLKH #data fusion #locality #simulation #using
A simulation study of sensor data fusion using UKF for bucket wheel reclaimer localization (SZ, TFL, BK, AH), pp. 1192–1197.
DACDAC-2012-ChangJC #configuration management #optimisation #using
Timing ECO optimization using metal-configurable gate-array spare cells (HYC, IHRJ, YWC), pp. 802–807.
DACDAC-2012-ChenH #3d #synthesis
Clock tree synthesis with methodology of re-use in 3D IC (FWC, TH), pp. 1094–1099.
DACDAC-2012-CropPC #detection #logic #throughput #using
Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DACDAC-2012-DonkohLS #adaptation #design #hybrid #predict #using
A hybrid and adaptive model for predicting register file and SRAM power using a reference design (ED, AL, ES), pp. 62–67.
DACDAC-2012-ForoutanSP #3d #interface #low cost #using
Cost-efficient buffer sizing in shared-memory 3D-MPSoCs using wide I/O interfaces (SF, AS, FP), pp. 366–375.
DACDAC-2012-HamzehSV #morphism #named #using
EPIMap: using epimorphism to map applications on CGRAs (MH, AS, SBKV), pp. 1284–1291.
DACDAC-2012-HuangLR #energy #hardware #trade-off #using
A methodology for energy-quality tradeoff using imprecise hardware (JH, JL, GR), pp. 504–509.
DACDAC-2012-HuLWR #array #hardware #using
Hardware realization of BSB recall function using memristor crossbar arrays (MH, HL, QW, GSR), pp. 498–503.
DACDAC-2012-JeongESP #cpu #gpu #memory management
A QoS-aware memory controller for dynamically balancing GPU and CPU bandwidth use in an MPSoC (MKJ, ME, CS, NCP), pp. 850–855.
DACDAC-2012-JungSB #off the shelf #using
Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
DACDAC-2012-KumarBKV #analysis #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LinMK #logic #satisfiability #using
Boolean satisfiability using noise based logic (PCKL, AM, SPK), pp. 1260–1261.
DACDAC-2012-MalburgFF #automation #design #hardware #locality #metric #using
Automated feature localization for hardware designs using coverage metrics (JM, AF, GF), pp. 941–946.
DACDAC-2012-MeirR #analysis #biology #named #network #performance #using
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-MorrisBZP #logic #named #using
mLogic: ultra-low voltage non-volatile logic circuits using STT-MTJ devices (DM, DB, JG(Z, LTP), pp. 486–491.
DACDAC-2012-ParkGMRR #architecture #design #energy #performance #using
Future cache design using STT MRAMs for improved energy efficiency: devices, circuits and architecture (SPP, SKG, NNM, AR, KR), pp. 492–497.
DACDAC-2012-SasanianWM #quantum #using
Realizing reversible circuits using a new class of quantum gates (ZS, RW, DMM), pp. 36–41.
DACDAC-2012-Suto #design #using
Rule agnostic routing by using design fabrics (GS), pp. 471–475.
DACDAC-2012-Taylor
Is dark silicon useful?: harnessing the four horsemen of the coming dark silicon apocalypse (MBT), pp. 1131–1136.
DACDAC-2012-YuCSJC #design #detection #using
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DACDAC-2012-ZhangTT #identification #using
Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
DATEDATE-2012-0002EGB #performance #using
Area efficient asynchronous SDM routers using 2-stage Clos switches (WS, DAE, JDG, WJB), pp. 1495–1500.
DATEDATE-2012-AridhiZT #order #reduction #simulation #towards #using
Towards improving simulation of analog circuits using model order reduction (HA, MHZ, ST), pp. 1337–1342.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATEDATE-2012-ChatziparaskevasBP #difference #finite #parallel #using
An FPGA-based parallel processor for Black-Scholes option pricing using finite differences schemes (GC, AB, IP), pp. 709–714.
DATEDATE-2012-CordesM #algorithm #parallel #search-based #using
Multi-objective aware extraction of task-level parallelism using genetic algorithms (DC, PM), pp. 394–399.
DATEDATE-2012-Gamatie #design #streaming #using
Design of streaming applications on MPSoCs using abstract clocks (AG), pp. 763–768.
DATEDATE-2012-KatzRZ #csp #generative #using
Generating instruction streams using abstract CSP (YK, MR, AZ), pp. 15–20.
DATEDATE-2012-LeMKV #debugging #satisfiability #using
Non-solution implications using reverse domination in a modern SAT-based debugging environment (BL, HM, BK, AGV), pp. 629–634.
DATEDATE-2012-MarianiSPZSB #architecture #configuration management #design #multi #resource management #runtime #using
Using multi-objective design space exploration to enable run-time resource management for reconfigurable architectures (GM, VMS, GP, VZ, CS, KB), pp. 1379–1384.
DATEDATE-2012-MaricauJG #analysis #learning #multi #reliability #using
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinMLB #design #incremental #using #verification
Verification of partial designs using incremental QBF solving (PM, CM, MDTL, BB), pp. 623–628.
DATEDATE-2012-MillerVG #automation #cyber-physical #mockup #named #testing #using
MEDS: Mockup Electronic Data Sheets for automated testing of cyber-physical systems using digital mockups (BM, FV, TG), pp. 1417–1420.
DATEDATE-2012-NarayananDZT #design #using #verification
Verifying jitter in an analog and mixed signal design using dynamic time warping (RN, AD, MHZ, ST), pp. 1413–1416.
DATEDATE-2012-QianTT #configuration management #self #using
A flit-level speedup scheme for network-on-chips using self-reconfigurable bi-directional channels (ZQ, YFT, CYT), pp. 1295–1300.
DATEDATE-2012-RoxEG #analysis #design #network #using
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SabrySA #3d #using
Thermal balancing of liquid-cooled 3D-MPSoCs using channel modulation (MMS, AS, DA), pp. 599–604.
DATEDATE-2012-SchrijenL #analysis #comparative
Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
DATEDATE-2012-ShahRK #bound #scheduling #using
Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
DATEDATE-2012-ShoaibJV
Enabling advanced inference on sensor nodes through direct use of compressively-sensed signals (MS, NKJ, NV), pp. 437–442.
DATEDATE-2012-StattelmannGCBR #hybrid #modelling #simulation #using
Hybrid source-level simulation of data caches using abstract cache models (SS, GG, CC, OB, WR), pp. 376–381.
DATEDATE-2012-WilleDOO #automation #design #power management #synthesis #using
Automatic design of low-power encoders using reversible circuit synthesis (RW, RD, CO, AGO), pp. 1036–1041.
DocEngDocEng-2012-MahlowGHS #framework #retrieval #using #xquery
A framework for retrieval and annotation in digital humanities using XQuery full text and update in BaseX (CM, CG, AH, MHS), pp. 195–204.
DocEngDocEng-2012-PeroniSV #documentation #lens #semantics #using
Faceted documents: describing document characteristics using semantic lenses (SP, DS, FV), pp. 191–194.
DRRDRR-2012-ChandaFP #clustering #documentation #using
Clustering document fragments using background color and texture information (SC, KF, UP).
DRRDRR-2012-FengY #component #composition #detection #documentation #using
Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRRDRR-2012-LinGTHL #documentation #embedded #identification #using
Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
DRRDRR-2012-RashwanRAAK #2d #pseudo #robust #using
A robust omnifont open-vocabulary arabic OCR system using pseudo-2D-HMM (AMR, MR, AAH, SA, AHK).
DRRDRR-2012-Silva #algorithm #detection #evaluation #using
Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
DRRDRR-2012-TangSS #distance #using
Handwriting individualization using distance and rarity (YT, SNS, HS).
HTHT-2012-CravinoDF #clustering #community #network #using
Using the overlapping community structure of a network of tags to improve text clustering (NC, JLD, ÁF), pp. 239–244.
HTHT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social #using
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
HTHT-2012-WeningerZH #using #web
Building enriched web page representations using link paths (TW, CZ, JH), pp. 53–62.
SIGMODSIGMOD-2012-El-HelwFI #information management #using
Just-in-time information extraction using extraction views (AEH, MHF, IFI), pp. 613–616.
SIGMODSIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance #using
Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
VLDBVLDB-2012-CandanRSW #constraints #named #using
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments (KSC, RR, MLS, XW), pp. 1519–1530.
VLDBVLDB-2012-CautisK #complexity #probability #query #using #xml
Answering Queries using Views over Probabilistic XML: Complexity and Tractability (BC, EK), pp. 1148–1159.
VLDBVLDB-2012-IseleB #learning #programming #search-based #using
Learning Expressive Linkage Rules using Genetic Programming (RI, CB), pp. 1638–1649.
VLDBVLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy #using
Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
VLDBVLDB-2012-LiKNC #estimation #query #robust #sql #statistics #using
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
VLDBVLDB-2012-LuSCO #nearest neighbour #performance #pipes and filters #using
Efficient Processing of k Nearest Neighbor Joins using MapReduce (WL, YS, SC, BCO), pp. 1016–1027.
VLDBVLDB-2012-PimplikarS #keyword #query #using #web
Answering Table Queries on the Web using Column Keywords (RP, SS), pp. 908–919.
VLDBVLDB-2012-SachanB #mining #statistics #string #using
Mining Statistically Significant Substrings using the Chi-Square Statistic (MS, AB), pp. 1052–1063.
VLDBVLDB-2012-ZhangCW #multi #performance #pipes and filters #using
Efficient Multi-way Theta-Join Processing Using MapReduce (XZ, LC, MW), pp. 1184–1195.
CSEETCSEET-2012-BollinHS #concept #education #experience #project management #simulation #using
Teaching Software Project Management using Simulations — The AMEISE Environment: from Concepts to Class Room Experience (AB, EH, LS), pp. 85–86.
CSEETCSEET-2012-TillmannMHFX #education #mobile #student #using
Engage Your Students by Teaching Computer Science Using Only Mobile Devices with TouchDevelop (NT, MM, JdH, MF, TX), pp. 87–89.
ITiCSEITiCSE-2012-CooperNS #using
Initial results of using an intelligent tutoring system with Alice (SC, YJN, LS), pp. 138–143.
ITiCSEITiCSE-2012-GoldweberDJ #hardware #operating system #using
Supporting operating systems projects using the μMPS2 hardware simulator (MG, RD, TJ), pp. 63–68.
ITiCSEITiCSE-2012-HershkovichH #education #how #tool support
How innovative technology tools can be used to create new methodology for teaching knowledge (EH, BH), p. 387.
ITiCSEITiCSE-2012-Impagliazzo #using
Using professional and ethical themes (JI), p. 374.
ITiCSEITiCSE-2012-Law #interactive #student #using
Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSEITiCSE-2012-Santos12a #education #java #using
Developing contexts for teaching Java using AGUIA/J (ALS), p. 378.
ITiCSEITiCSE-2012-Urquiza-FuentesV #animation #education #effectiveness
Comparing the effectiveness of different educational uses of program animations (JUF, JÁVI), pp. 174–179.
TFPIETFPIE-2012-ODonnell #education #functional #hardware #using
Connecting the Dots: Computer Systems Education using a Functional Hardware Description Language (JTO), pp. 20–39.
FASEFASE-2012-SalayFC #independence #modelling #refinement #using
Language Independent Refinement Using Partial Modeling (RS, MF, MC), pp. 224–239.
FASEFASE-2012-ShiCD #composition #execution #integration #product line #symbolic computation #testing #using
Integration Testing of Software Product Lines Using Compositional Symbolic Execution (JS, MBC, MBD), pp. 270–284.
FASEFASE-2012-UsaolaML #reduction #testing #using
Reduction of Test Suites Using Mutation (MPU, PRM, BPL), pp. 425–438.
FoSSaCSFoSSaCS-2012-PreugschatW #automaton #effectiveness #logic #using
Effective Characterizations of Simple Fragments of Temporal Logic Using Prophetic Automata (SP, TW), pp. 135–149.
TACASTACAS-2012-FehnkerGHMPT #analysis #automation #using
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-HolzerKSTV #contest #proving #reachability #using
Proving Reachability Using FShell — (Competition Contribution) (AH, DK, CS, MT, HV), pp. 538–541.
TACASTACAS-2012-LangM #equation #lts #model checking #network #using
Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems (FL, RM), pp. 141–156.
TACASTACAS-2012-ZaeemGKM #data type #satisfiability #using
History-Aware Data Structure Repair Using SAT (RNZ, DG, SK, KSM), pp. 2–17.
WRLAWRLA-2012-Riesco #maude #specification #using
Using Narrowing to Test Maude Specifications (AR), pp. 201–220.
CSMRCSMR-2012-BettenburgTH #code search #fuzzy #source code #using
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMRCSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict #using
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-GrantCS #maintenance #modelling #topic #using
Using Topic Models to Support Software Maintenance (SG, JRC, DBS), pp. 403–408.
CSMRCSMR-2012-HamannVGK #monitoring #runtime
Abstract Runtime Monitoring with USE (LH, LV, MG, MK), pp. 549–552.
CSMRCSMR-2012-HosseiniNG #debugging #predict #using
A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes (HH, RN, MWG), pp. 149–158.
CSMRCSMR-2012-JaszSBOG #impact analysis #using
Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMRCSMR-2012-Koschke #clone detection #detection #scalability #using
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMRCSMR-2012-MoghadamC #automation #design #difference #refactoring #using
Automated Refactoring Using Design Differencing (IHM, MÓC), pp. 43–52.
CSMRCSMR-2012-PetersZ #mining #repository #smell #using
Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code #using
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters #using
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-AliSGA #empirical #requirements #traceability #using
An empirical study on requirements traceability using eye-tracking (NA, ZS, YGG, GA), pp. 191–200.
ICSMEICSM-2012-KobayashiKKYM #clustering #composition #dependence #using
Feature-gathering dependency-based software clustering using Dedication and Modularity (KK, MK, KK, KY, AM), pp. 462–471.
ICSMEICSM-2012-KoutersVSB #gnome #repository #using
Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
ICSMEICSM-2012-QiML #automation #performance #scalability #source code #using
Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
ICSMEICSM-2012-QuAR #impact analysis #testing #using
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RupakhetiH #constraints #fault #modelling #similarity #theorem proving #using
Finding errors from reverse-engineered equality models using a constraint solver (CRR, DH), pp. 77–86.
MSRMSR-2012-ChenTNH #fault #modelling #topic #using
Explaining software defects using topic models (THC, SWT, MN, AEH), pp. 189–198.
SCAMSCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using
Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAMSCAM-2012-AliSGA #debugging #using
Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
SCAMSCAM-2012-HillRK #debugging #java #locality #on the
On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
SCAMSCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
WCREWCRE-2012-DaviesRW #debugging #locality #similarity #using
Using Bug Report Similarity to Enhance Bug Localisation (SD, MR, MW), pp. 125–134.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise #using
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository #using
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCREWCRE-2012-RomanoRPK #fine-grained #source code #using
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
WCREWCRE-2012-SteidlHJ #analysis #network #recommendation #using
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
WCREWCRE-2012-ZiftciK #data mining #feature model #mining #using
Feature Location Using Data Mining on Existing Test-Cases (CZ, IK), pp. 155–164.
PEPMPEPM-2012-HirzelG #metaprogramming #using
Streams that compose using macros that oblige (MH, BG), pp. 141–150.
PLDIPLDI-2012-DilligDA #abduction #automation #fault #using
Automated error diagnosis using abductive inference (ID, TD, AA), pp. 181–192.
SASSAS-2012-HoweK #analysis #parametricity #using
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-SanchezSSC #generative #invariant #self #using
Invariant Generation for Parametrized Systems Using Self-reflection — (Extended Version) (AS, SS, CS, BYEC), pp. 146–163.
STOCSTOC-2012-AbrahamN #using
Using petal-decompositions to build a low stretch spanning tree (IA, ON), pp. 395–406.
STOCSTOC-2012-KelnerMP #approximate #multi #performance #using
Faster approximate multicommodity flow using quadratically coupled flows (JAK, GLM, RP), pp. 1–18.
ICALPICALP-v1-2012-JefferyKM #complexity #graph #matrix #multi #quantum #query #using
Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision (SJ, RK, FM), pp. 522–532.
ICALPICALP-v1-2012-KrauthgamerZ #using
Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
FMFM-2012-BenkiraneNSS #algebra #process #using
Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra (SB, RN, ES, CS), pp. 101–115.
FMFM-2012-HieronsMN #distributed #order #testing #using
Using Time to Add Order to Distributed Testing (RMH, MGM, MN), pp. 232–246.
FMFM-2012-OsaiweranFGR #case study #component #design #experience #formal method #using
Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FMFM-2012-PlaggeL #using #validation
Validating B, Z and TLA + Using ProB and Kodkod (DP, ML), pp. 372–386.
FMFM-2012-SongT #detection #model checking #performance #using
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
FMFM-2012-YangKK #formal method #lightweight #using
Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
IFMIFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling #using
Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFMIFM-2012-RochaBCN #bound #comprehension #debugging #model checking #programming #using
Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFMSEFM-2012-BicknellRBCS #approach #using #verification
A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFMSEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing #using
An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFMSEFM-2012-MatichukM #automation #proving #specification
Extensible Specifications for Automatic Re-use of Specifications and Proofs (DM, TCM), pp. 333–341.
ICFPICFP-2012-Danielsson #monad #semantics #using
Operational semantics using the partiality monad (NAD), pp. 127–138.
ICGTICGT-2012-Ong #graph transformation #multi #programming language #rule-based #using
Multi-scale Rule-Based Graph Transformation Using the Programming Language XL (YO), pp. 417–419.
CHICHI-2012-AndrewsBEK #branch #interactive #using
Creating and using interactive narratives: reading and writing branching comics (DA, CB, SE, MK), pp. 1703–1712.
CHICHI-2012-ArchambaultG #facebook #twitter
A longitudinal study of facebook, linkedin, & twitter use (AA, JG), pp. 2741–2750.
CHICHI-2012-Barkhuus #human-computer #privacy #using
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
CHICHI-2012-BullingAS #security #using #visual notation
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
CHICHI-2012-ChettyBBDG #comprehension
You’re capped: understanding the effects of bandwidth caps on broadband use in the home (MC, RB, AJBB, JD, REG), pp. 3021–3030.
CHICHI-2012-CohnMPT #interactive #named #realtime #using
Humantenna: using the body as an antenna for real-time whole-body interaction (GC, DM, SP, DST), pp. 1901–1910.
CHICHI-2012-DearmanGT #mobile #using
Determining the orientation of proximate mobile devices using their back facing camera (DD, RTG, KNT), pp. 2231–2234.
CHICHI-2012-DearmanT #using
Evaluating the implicit acquisition of second language vocabulary using a live wallpaper (DD, KNT), pp. 1391–1400.
CHICHI-2012-DixonFW #analysis #interface #using #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-EricksonPSDCN #evaluation #feedback
The dubuque water portal: evaluation of the uptake, use and impact of residential water consumption feedback (TE, MP, SS, JD, TC, MRN), pp. 675–684.
CHICHI-2012-EvansW #behaviour #metric
Taming wild behavior: the input observer for text entry and mouse pointing measures from everyday computer use (AE, JOW), pp. 1947–1956.
CHICHI-2012-FallahABF #navigation #using #visual notation
The user as a sensor: navigating users with visual impairments in indoor spaces using tactile landmarks (NF, IA, KEB, EF), pp. 425–432.
CHICHI-2012-GhomiFHCB #using
Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHICHI-2012-GoelFW #mobile #named #using
WalkType: using accelerometer data to accomodate situational impairments in mobile touch screen text entry (MG, LF, JOW), pp. 2687–2696.
CHICHI-2012-GuptaMPT #gesture #named #using
SoundWave: using the doppler effect to sense gestures (SG, DM, SP, DST), pp. 1911–1914.
CHICHI-2012-HarrisonH #2d #interactive #using
Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
CHICHI-2012-HayashiPOH #named #using
WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CHICHI-2012-HenzeRB #behaviour #mobile #type system #using
Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
CHICHI-2012-HietanenSAL #image
: helping the legal use of creative commons images (HH, AS, KA, YL), pp. 599–608.
CHICHI-2012-HuhnKLK #evaluation #on the
On the use of virtual environments for the evaluation of location-based applications (AEH, VJK, AL, PK), pp. 2569–2578.
CHICHI-2012-KjeldskovSPP #case study #mobile #using
Using mobile phones to support sustainability: a field study of residential electricity consumption (JK, MBS, JP, RP), pp. 2347–2356.
CHICHI-2012-KlempererLMSUBCGR #data access #exclamation #using
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHICHI-2012-KoppelBMW #behaviour
Chained displays: configurations of public displays can be used to influence actor-, audience-, and passer-by behavior (MTK, GB, JM, RW), pp. 317–326.
CHICHI-2012-KumarRTAK #game studies #mobile #speech #using
Improving literacy in developing countries using speech recognition-supported games on mobile devices (AK, PR, AT, RA, MK), pp. 1149–1158.
CHICHI-2012-LicoppeI #case study #mobile #quote
“Timid encounters”: a case study in the use of proximity-based mobile technologies (CL, YI), pp. 2759–2768.
CHICHI-2012-LindsayJSO #design #people #using
Engaging older people using participatory design (SL, DJ, GS, PO), pp. 1199–1208.
CHICHI-2012-MatthewsJW #design #experience #how #question #user interface
How do designers and user experience professionals actually perceive and use personas? (TM, TKJ, SW), pp. 1219–1228.
CHICHI-2012-MentisOST #image #interactive
Interaction proxemics and image use in neurosurgery (HMM, KO, AS, RT), pp. 927–936.
CHICHI-2012-NicolauJ #comprehension #type system #using
Touch typing using thumbs: understanding the effect of mobility and hand posture (HN, JAJ), pp. 2683–2686.
CHICHI-2012-OganWBRCLC #case study #collaboration #design #recommendation
Collaboration in cognitive tutor use in latin America: field study and design recommendations (AO, EW, RSJdB, GRM, MJC, TL, AMJBdC), pp. 1381–1390.
CHICHI-2012-ParkBN #how #question
How do couples use CheekTouch over phone calls? (YP, SHB, TJN), pp. 763–766.
CHICHI-2012-QiB #memory management #using
Animating paper using shape memory alloys (JQ, LB), pp. 749–752.
CHICHI-2012-SchwarzKHDW #ad hoc #mobile #scalability #using
Phone as a pixel: enabling ad-hoc, large-scale displays using mobile devices (JS, DK, CH, PD, AW), pp. 2235–2238.
CHICHI-2012-SoodAC #community #online
Profanity use in online communities (SOS, JA, EFC), pp. 1481–1490.
CHICHI-2012-TangMHRIZC #interactive #lightweight #using #video
Time travel proxy: using lightweight video recordings to create asynchronous, interactive meetings (JCT, JM, AH, AR, KI, CZ, XC), pp. 3111–3120.
CHICHI-2012-TossellKRSZ #smarttech #web
Characterizing web use on smartphones (CT, PTK, AR, CS, LZ), pp. 2769–2778.
CHICHI-2012-VardoulakisKMSGT #mobile #using
Using mobile phones to present medical information to hospital patients (LPV, AKK, DM, GS, JG, DST), pp. 1411–1420.
CHICHI-2012-XinBR #empirical
Natural use profiles for the pen: an empirical exploration of pressure, tilt, and azimuth (YX, XB, XR), pp. 801–804.
CHICHI-2012-YardiB #difference #product line
Income, race, and class: exploring socioeconomic differences in family technology use (SY, AB), pp. 3041–3050.
CHICHI-2012-YataniBT #feedback #named #people #representation #using #visual notation
SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback (KY, NB, KNT), pp. 415–424.
CHICHI-2012-YemKYSYY #using
Assisting hand skill transfer of tracheal intubation using outer-covering haptic display (VY, HK, NY, RS, HY, JY), pp. 3177–3180.
CHICHI-2012-ZhaoSC #facebook #how
It’s complicated: how romantic partners use facebook (XZ, VSS, DC), pp. 771–780.
CSCWCSCW-2012-BoltonKV #comparison #performance #using
A comparison of competitive and cooperative task performance using spherical and flat displays (JB, KK, RV), pp. 529–538.
CSCWCSCW-2012-FollmerBRSI #interactive #people #using
People in books: using a FlashCam to become part of an interactive book for connected reading (SF, RB, HR, MS, HI), pp. 685–694.
CSCWCSCW-2012-JuAL #game studies #low cost #using
Using low cost game controllers to capture data for 6th grade science labs (WJ, UA, SL), pp. 1115–1124.
CSCWCSCW-2012-NagpalHJL #personalisation #social #using #web
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search (AN, SH, RRJ, MSL), pp. 461–470.
CSCWCSCW-2012-Olson #research
Broader impacts: research you can use (JO), pp. 3–4.
CSCWCSCW-2012-PalMK #identification
Question temporality: identification and uses (AP, JM, JAK), pp. 257–260.
CSCWCSCW-2012-RobinsonJVM #authoring #collaboration #named #using
PicoTales: collaborative authoring of animated stories using handheld projectors (SR, MJ, EV, GM), pp. 671–680.
AdaEuropeAdaEurope-2012-GregertsenS #execution #hardware #performance #using
Improving the Performance of Execution Time Control by Using a Hardware Time Management Unit (KNG, AS), pp. 177–192.
AdaEuropeAdaEurope-2012-Iliasov #case study #development #reasoning
Augmenting Formal Development with Use Case Reasoning (AI), pp. 133–146.
HILTHILT-2012-BeltCHR #ada #automation #contract #using #verification
Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan (JB, PC, JH, R), pp. 3–4.
HILTHILT-2012-EilersK #adaptation #runtime
Adapting ACATS for use with run-time checks suppressed (DE, TK), pp. 97–102.
HILTHILT-2012-Leino12a #proving #using #verification #why
Program proving using intermediate verification languages (IVLs) like boogie and why3 (KRML), pp. 25–26.
HILTHILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial #using
Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
CAiSECAiSE-2012-SchalerLRS #database #information management #using
Building Information System Variants with Tailored Database Schemas Using Features (MS, TL, MR, GS), pp. 597–612.
CAiSECAiSE-2012-ZawawyKMM #analysis #logic #markov #network #using
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
ICEISICEIS-J-2012-FabbriHTBZS12a #mining #using #visualisation
Using Information Visualization and Text Mining to Facilitate the Conduction of Systematic Literature Reviews (SF, EMH, ADT, AB, AZ, CS), pp. 243–256.
ICEISICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse #using
Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEISICEIS-v1-2012-AmarGMHLN #concept analysis #using
Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEISICEIS-v1-2012-AyresS #fuzzy #mining #ontology #similarity #using
Mining Generalized Association Rules using Fuzzy Ontologies with Context-based Similarity (RMJA, MTPS), pp. 74–83.
ICEISICEIS-v1-2012-KosorusBK #query #semantics #similarity #taxonomy #using
Semantic Similarity between Queries in QA System using a Domain-specific Taxonomy (HK, AB, JK), pp. 241–246.
ICEISICEIS-v1-2012-TertiltBK #algorithm #enterprise #modelling #performance #scalability #using
Modeling the Performance and Scalability of a SAP ERP System using an Evolutionary Algorithm (DT, AB, HK), pp. 112–118.
ICEISICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process #using
Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
ICEISICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification #using
Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
ICEISICEIS-v2-2012-FonteBCGH #evaluation #program analysis #using
Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEISICEIS-v2-2012-FrancaS #aspect-oriented #bibliography #evaluation #metric #programming #using
A Systematic Review on Evaluation of Aspect Oriented Programming using Software Metrics (JMSF, MdSS), pp. 77–83.
ICEISICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics #using
Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
ICEISICEIS-v2-2012-PantojaC #approach #development #using
A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEISICEIS-v2-2012-ReichelR #process #requirements #using
Prioritization of Product Requirements using the Analytic Hierarchy Process (TR, GR), pp. 70–76.
ICEISICEIS-v2-2012-YiasemisA #automation #fault #locality #mutation testing #testing #using
Dynamic Localisation and Automatic Correction of Software Faults using Evolutionary Mutation Testing (PSY, ASA), pp. 15–26.
ICEISICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface #using
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
ICEISICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi #using
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
ICEISICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy #using
A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
CIKMCIKM-2012-AgarwalCW #multi #ranking #using
Multi-faceted ranking of news articles using post-read actions (DA, BCC, XW), pp. 694–703.
CIKMCIKM-2012-BaeJKL #detection #using
Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKMCIKM-2012-BambaSGBF #concept #recommendation #scalability #using
The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function (PB, JS, CG, NB, JF), pp. 2275–2278.
CIKMCIKM-2012-BannourH #image #semantics #using
Hierarchical image annotation using semantic hierarchies (HB, CH), pp. 2431–2434.
CIKMCIKM-2012-CheungSM #recommendation #social #synthesis #using
Using program synthesis for social recommendations (AC, ASL, SM), pp. 1732–1736.
CIKMCIKM-2012-ChiangWD #clustering #network #normalisation #scalability #using
Scalable clustering of signed networks using balance normalized cut (KYC, JJW, ISD), pp. 615–624.
CIKMCIKM-2012-ChongCZSQZ #pattern matching #rdf #using
RDF pattern matching using sortable views (ZC, HC, ZZ, HS, GQ, AZ), pp. 315–324.
CIKMCIKM-2012-Chung #using
Finding food entity relationships using user-generated data in recipe service (YjC), pp. 2611–2614.
CIKMCIKM-2012-CosciaR #how #using #web
Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
CIKMCIKM-2012-GopalakrishnanIMRS #using
Matching product titles using web-based enrichment (VG, SPI, AM, RR, SHS), pp. 605–614.
CIKMCIKM-2012-HuangCLL #predict #probability #process #social #using
Predicting aggregate social activities using continuous-time stochastic process (SH, MC, BL, DL), pp. 982–991.
CIKMCIKM-2012-HwangLKL #on the #performance #recommendation #using
On using category experts for improving the performance and accuracy in recommender systems (WSH, HJL, SWK, ML), pp. 2355–2358.
CIKMCIKM-2012-KhabsaTG #using
Entity resolution using search engine results (MK, PT, CLG), pp. 2363–2366.
CIKMCIKM-2012-KimYK #equation #query #retrieval #using #word
Mathematical equation retrieval using plain words as a query (SK, SY, YK), pp. 2407–2410.
CIKMCIKM-2012-LinDH0S #automation #image #random #using #visual notation
Automatic image annotation using tag-related random search over visual neighbors (ZL, GD, MH, JW, JS), pp. 1784–1788.
CIKMCIKM-2012-LinTCXS #effectiveness #performance #sentiment #using
Effective and efficient?: bilingual sentiment lexicon extraction using collocation alignment (ZL, ST, XC, XX, WS), pp. 1542–1546.
CIKMCIKM-2012-LongCZZ #classification #named #using
TCSST: transfer classification of short & sparse text using external data (GL, LC, XZ, CZ), pp. 764–772.
CIKMCIKM-2012-LongGXK #approach #design #using
A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKMCIKM-2012-MacdonaldSO #learning #on the #query #rank
On the usefulness of query features for learning to rank (CM, RLTS, IO), pp. 2559–2562.
CIKMCIKM-2012-McCreadieMOGJ #crowdsourcing #using #web
An examination of content farms in web search using crowdsourcing (RM, CM, IO, JG, FJ), pp. 2551–2554.
CIKMCIKM-2012-MendesMZB #graph #similarity #using
Measuring website similarity using an entity-aware click graph (PNM, PM, HZ, RB), pp. 1697–1701.
CIKMCIKM-2012-NegahbanRG #learning #multi #performance #scalability #statistics #using
Scaling multiple-source entity resolution using statistically efficient transfer learning (SN, BIPR, JG), pp. 2224–2228.
CIKMCIKM-2012-NoroziAV #documentation #using #wiki
Contextualization using hyperlinks and internal hierarchical structure of Wikipedia documents (MAN, PA, APdV), pp. 734–743.
CIKMCIKM-2012-QureshiOP #n-gram #using #wiki
Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKMCIKM-2012-RaiberKT #estimation #using #web
Content-based relevance estimation on the web using inter-document similarities (FR, OK, MT), pp. 1769–1773.
CIKMCIKM-2012-SiposSSJ #corpus #summary #using #word
Temporal corpus summarization using submodular word coverage (RS, AS, PS, TJ), pp. 754–763.
CIKMCIKM-2012-SrinivasanBC #modelling #using
Segmenting web-domains and hashtags using length specific models (SS, SB, RC), pp. 1113–1122.
CIKMCIKM-2012-TsatsaronisVN #documentation #named #semantics #using
SemaFor: semantic document indexing using semantic forests (GT, IV, KN), pp. 1692–1696.
CIKMCIKM-2012-WangQD #automation #clustering #documentation #using
Improving document clustering using automated machine translation (XW, BQ, ID), pp. 645–653.
CIKMCIKM-2012-WangWLL #graph #keyword #ranking #using #wiki
Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
CIKMCIKM-2012-WangZCM #network #retrieval #using
Top-k retrieval using conditional preference networks (HW, XZ, WC, PM), pp. 2075–2079.
CIKMCIKM-2012-WeiFLC #canonical #dependence #using
Model the complex dependence structures of financial variables by using canonical vine (WW, XF, JL, LC), pp. 1382–1391.
CIKMCIKM-2012-WongCTP #using #web
Mixed-initiative conversational system using question-answer pairs mined from the web (WW, LC, JT, LP), pp. 2707–2709.
CIKMCIKM-2012-YanGLCW #clustering #matrix #using
Clustering short text using Ncut-weighted non-negative matrix factorization (XY, JG, SL, XC, YW), pp. 2259–2262.
CIKMCIKM-2012-YangZW #collaboration #incremental #predict #scalability #using
Scalable collaborative filtering using incremental update and local link prediction (XY, ZZ, KW), pp. 2371–2374.
CIKMCIKM-2012-YuSNMH #network #similarity #using
User guided entity similarity search using meta-path selection in heterogeneous information networks (XY, YS, BN, TM, JH), pp. 2025–2029.
ECIRECIR-2012-BoudinND #predict #query #using
Using a Medical Thesaurus to Predict Query Difficulty (FB, JYN, MD), pp. 480–484.
ECIRECIR-2012-KarlgrenSOEH #analysis #sentiment
Usefulness of Sentiment Analysis (JK, MS, FO, FE, OH), pp. 426–435.
ECIRECIR-2012-MantrachR12a #multi #query #using
A Mailbox Search Engine Using Query Multi-modal Expansion and Community-Based Smoothing (AM, JMR), pp. 576–577.
ECIRECIR-2012-NawabSC #documentation #query #using
Retrieving Candidate Plagiarised Documents Using Query Expansion (RMAN, MS, PDC), pp. 207–218.
ECIRECIR-2012-OghinaBTR #predict #social #social media #using
Predicting IMDB Movie Ratings Using Social Media (AO, MB, MT, MdR), pp. 503–507.
ECIRECIR-2012-TholpadiDBS #clustering #corpus #multi #using
Cluster Labeling for Multilingual Scatter/Gather Using Comparable Corpora (GT, MKD, CB, SKS), pp. 388–400.
ECIRECIR-2012-ZucconAZW #analysis #retrieval #using
Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICMLICML-2012-Araya-LopezBT #using
Near-Optimal BRL using Optimistic Local Transitions (MAL, OB, VT), p. 70.
ICMLICML-2012-Ben-DavidLSS #classification #fault #using
Minimizing The Misclassification Error Rate Using a Surrogate Convex Loss (SBD, DL, NS, KS), p. 16.
ICMLICML-2012-BoukouvalasBC #process #using
Gaussian Process Quantile Regression using Expectation Propagation (AB, RB, DC), p. 123.
ICMLICML-2012-Busa-FeketeBK #classification #graph #performance #using
Fast classification using sparse decision DAGs (RBF, DB, BK), p. 99.
ICMLICML-2012-DhillonRFU #modelling #using #word
Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICMLICML-2012-HaiderS #clustering #graph #using
Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
ICMLICML-2012-JalaliS12a #clustering #optimisation #using
Clustering using Max-norm Constrained Optimization (AJ, NS), p. 205.
ICMLICML-2012-JiangLS #3d #learning #using
Learning Object Arrangements in 3D Scenes using Human Context (YJ, ML, AS), p. 119.
ICMLICML-2012-LeRMDCCDN #learning #scalability #using
Building high-level features using large scale unsupervised learning (QVL, MR, RM, MD, GC, KC, JD, AYN), p. 69.
ICMLICML-2012-PletscherW
LPQP for MAP: Putting LP Solvers to Better Use (PP, SW), p. 93.
ICMLICML-2012-SejdinovicGSF #kernel #testing #using
Hypothesis testing using pairwise distances and associated kernels (DS, AG, BKS, KF), p. 104.
ICMLICML-2012-ShanKRBSR #matrix #predict #probability #using
Gap Filling in the Plant Kingdom — Trait Prediction Using Hierarchical Probabilistic Matrix Factorization (HS, JK, PBR, AB, FS, MR), p. 47.
ICMLICML-2012-SilverC #composition #modelling #using
Compositional Planning Using Optimal Option Models (DS, KC), p. 165.
ICMLICML-2012-YuSL #network #speech #using
Conversational Speech Transcription Using Context-Dependent Deep Neural Networks (DY, FS, GL), p. 1.
ICMLICML-2012-ZhaiHBW #image #modelling #process #using
Modeling Images using Transformed Indian Buffet Processes (KZ, YH, JLBG, SW), p. 118.
ICPRICPR-2012-0001ZP #segmentation #using
Unsupervised dynamic texture segmentation using local descriptors in volumes (JC, GZ, MP), pp. 3622–3625.
ICPRICPR-2012-AfzalBKSB #documentation #image #parametricity #robust #using
Robust stereo matching for document images using parameter selection of text-line extraction (MZA, SSB, MK, FS, TMB), pp. 331–334.
ICPRICPR-2012-AhmedA #gesture #modelling #using
Flow Modeling and skin-based Gaussian pruning to recognize gestural actions using HMM (ORA, AAH), pp. 3488–3491.
ICPRICPR-2012-AliGBPNP #biology #classification #using
Classification of biological cells using bio-inspired descriptors (WBHA, DG, MB, PP, RN, TP), pp. 3353–3357.
ICPRICPR-2012-AotoTSMY #estimation #using
Position estimation of near point light sources using a clear hollow sphere (TA, TT, TS, YM, NY), pp. 3721–3724.
ICPRICPR-2012-AryafarJS #automation #classification #using
Automatic musical genre classification using sparsity-eager support vector machines (KA, SJ, AS), pp. 1526–1529.
ICPRICPR-2012-AttamimiNN #markov #multi #recognition #using
Hierarchical multilevel object recognition using Markov model (MA, TN, TN), pp. 2963–2966.
ICPRICPR-2012-AydemirEGK #summary #using #video
Video summarization using simple action patterns (MSA, UE, AG, MEK), pp. 2047–2050.
ICPRICPR-2012-AzizWH #using
Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPRICPR-2012-BaiHHR #clustering #complexity #graph #using
Graph clustering using graph entropy complexity traces (LB, ERH, LH, PR), pp. 2881–2884.
ICPRICPR-2012-BaiHR #graph #kernel #using
Jensen-Shannon graph kernel using information functionals (LB, ERH, PR), pp. 2877–2880.
ICPRICPR-2012-BanerjeeN #kernel #learning #multi #process #recognition #using
Pose based activity recognition using Multiple Kernel learning (PB, RN), pp. 445–448.
ICPRICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation #using
3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPRICPR-2012-BespalovQBS #classification #image #scalability #using
Large-scale image classification using supervised spatial encoder (DB, YQ, BB, AS), pp. 581–584.
ICPRICPR-2012-BicegoL #2d #biology #recognition #sequence #tool support #using
2D shape recognition using biological sequence alignment tools (MB, PL), pp. 1359–1362.
ICPRICPR-2012-BoomHHF #clustering #dataset #image #using
Supporting ground-truth annotation of image datasets using clustering (BJB, PXH, JH, RBF), pp. 1542–1545.
ICPRICPR-2012-BougesCBL #classification #nearest neighbour #using
Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
ICPRICPR-2012-BoulmerkaA #segmentation #using
Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
ICPRICPR-2012-BuchholzKWW #3d #image #locality #using
3D object localization using single camera images (DB, DK, SW, FMW), pp. 821–824.
ICPRICPR-2012-ChangDZDW #representation #sketching #synthesis #using
Smoothness-constrained face photo-sketch synthesis using sparse representation (LC, XD, MZ, FD, ZW), pp. 3025–3029.
ICPRICPR-2012-ChenHCHC #analysis #using
Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPRICPR-2012-ChenLL #artificial reality #image #using
Depth image enhancement for Kinect using region growing and bilateral filter (LC, HL, SL), pp. 3070–3073.
ICPRICPR-2012-ChenXF #approximate #using
Compression of GPS trajectories using optimized approximation (MC, MX, PF), pp. 3180–3183.
ICPRICPR-2012-CheungP #detection #using
Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPRICPR-2012-ChowdhuryBP #detection #using
Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPRICPR-2012-ChowdhuryKPD #design #graph #using #video
Video storyboard design using Delaunay graphs (ASC, SKK, RP, MND), pp. 3108–3111.
ICPRICPR-2012-CrandallFP #modelling #probability #using #visual notation
Layer-finding in radar echograms using probabilistic graphical models (DJC, GCF, JP), pp. 1530–1533.
ICPRICPR-2012-DattaBFP #identification #modelling #using
Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
ICPRICPR-2012-DoTT #multi #representation #using
Text/graphic separation using a sparse representation with multi-learned dictionaries (THD, ST, ORT), pp. 689–692.
ICPRICPR-2012-EdmundsonS #image #performance #retrieval #using
Fast JPEG image retrieval using optimised Huffman tables (DE, GS), pp. 3188–3191.
ICPRICPR-2012-El-GaalyT #kernel #multi #recognition #using
RGBD object pose recognition using local-global multi-kernel regression (TEG, MT), pp. 2468–2471.
ICPRICPR-2012-ElnakibNCPGE #3d #analysis #quantifier #using
Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPRICPR-2012-ErsoyBPP #classification #image #using
HEp-2 cell classification in IIF images using Shareboost (IE, FB, JP, KP), pp. 3362–3365.
ICPRICPR-2012-FernandezT #documentation #segmentation #using
Document segmentation using Relative Location Features (FCF, ORT), pp. 1562–1565.
ICPRICPR-2012-Gao12a #clustering #estimation #multi #using
Facial age estimation using Clustered Multi-task Support Vector Regression Machine (PXG), pp. 541–544.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi #using
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GlodekSPS #classification #markov #multi #network #using
Multi-modal Fusion based on classifiers using reject options and Markov Fusion Networks (MG, MS, GP, FS), pp. 1084–1087.
ICPRICPR-2012-GonfausGGRG #classification #geometry #using
Edge classification using photo-geometric features (JMG, TG, AG, FXR, JG), pp. 1497–1500.
ICPRICPR-2012-GujraniyaM #classification #modelling #performance #topic #using
Efficient classification using phrases generated by topic models (DG, MNM), pp. 2331–2334.
ICPRICPR-2012-HaraKMM #3d #generative #using #video
Fast-accurate 3D face model generation using a single video camera (TH, HK, AM, SM), pp. 1269–1272.
ICPRICPR-2012-HeLL #image #using
Single image super-resolution using Gaussian Mixture Model (HH, JL, XL), pp. 1916–1919.
ICPRICPR-2012-HesseGGE #multi #recognition #using
Multi-view facial expression recognition using local appearance features (NH, TG, HG, HKE), pp. 3533–3536.
ICPRICPR-2012-HsuNWC #component #using
Pedestrian tracking in low contrast regions using aggregated background model and Silhouette Components (GSH, HPN, CHW, SLC), pp. 3680–3683.
ICPRICPR-2012-HuangH #invariant #using
Binary invariant cross color descriptor using galaxy sampling (GHH, CRH), pp. 2610–2613.
ICPRICPR-2012-HuiC #robust #towards #using
Towards a robust hand-eye calibration using normal flows (TWH, RC), pp. 2545–2548.
ICPRICPR-2012-IkemuraF #detection #using
Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPRICPR-2012-Imajo #algorithm #performance #using
Fast Gaussian filtering algorithm using splines (KI), pp. 489–492.
ICPRICPR-2012-InoueSK #representation #using
Local intensity compensation using sparse representation (KI, HS, YK), pp. 951–954.
ICPRICPR-2012-IshidaKKN #generative #recognition #using
Road marking recognition for map generation using sparse tensor voting (HI, KK, YK, TN), pp. 1132–1135.
ICPRICPR-2012-ItohTA #3d #graph #image #sequence #using
3D tracking of soccer players using time-situation graph in monocular image sequence (HI, TT, YA), pp. 2532–2536.
ICPRICPR-2012-IwamotoHSTXC #image #representation #self #using
Super-resolution of MR volumetric images using sparse representation and self-similarity (YI, XHH, SS, KT, WX, YWC), pp. 3758–3761.
ICPRICPR-2012-KananA #order #pseudo #recognition #using
Recognition of facial expressions using locally weighted and adjusted order Pseudo Zernike Moments (HRK, MA), pp. 3419–3422.
ICPRICPR-2012-KataokaSM #detection #using
Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPRICPR-2012-KawabataK #approach #multi #using
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-KawaiMHIY #identification #using
Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-KrijtheHL #classification #using
Improving cross-validation based classifier selection using meta-learning (JHK, TKH, ML), pp. 2873–2876.
ICPRICPR-2012-KuriharaA #correlation #image #using
Motion blur free photometric stereo using correlation image sensor (TK, SA), pp. 1872–1875.
ICPRICPR-2012-KusumaSLL #recognition #sequence #using
Appearance-based object recognition using weighted longest increasing subsequence (GPK, AS, YL, JAL), pp. 3668–3671.
ICPRICPR-2012-LamSS #image #statistics #using
Denoising hyperspectral images using spectral domain statistics (AL, IS, YS), pp. 477–480.
ICPRICPR-2012-LeeCP #estimation #using
Articulated hand configuration and rotation estimation using extended torus manifold embedding (CSL, SYC, SWP), pp. 441–444.
ICPRICPR-2012-LeeLCY #lightweight #random #representation #using
Lightweight Random Ferns using binary representation (SL, SWL, YNC, HSY), pp. 1342–1345.
ICPRICPR-2012-LinnerS #comparison #normalisation #quality #using
Comparison of restoration quality on square and hexagonal grids using normalized convolution (EL, RS), pp. 3046–3049.
ICPRICPR-2012-LinSCLH #recognition #using
Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPRICPR-2012-LiPMH #classification #email #incremental #learning #using
Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
ICPRICPR-2012-LiST #locality #using
Accurate iris localization using contour segments (HL, ZS, TT), pp. 3398–3401.
ICPRICPR-2012-LiuLS #documentation #image #modelling #probability #using #visual notation
Document image matching using probabilistic graphical models (LL, YL, CYS), pp. 637–640.
ICPRICPR-2012-LiuWZL #using
Pan-sharpening using weighted red-black wavelet (QL, YW, ZZ, LL), pp. 1908–1911.
ICPRICPR-2012-LiuXAR #geometry #recognition #using
Hand posture recognition using finger geometric feature (LL, JX, HA, XR), pp. 565–568.
ICPRICPR-2012-LiVBB #clustering #learning #using
Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
ICPRICPR-2012-LiW #encoding #matrix #recognition #using
Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
ICPRICPR-2012-LiYLKZL #classification #multi #using
Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification (KL, JY, ZL, XK, RZ, WL), pp. 170–173.
ICPRICPR-2012-LuHLC #recognition #using
Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPRICPR-2012-LuLZSCO #using
Learning-based deformable registration using weighted mutual information (YL, RL, LZ, YS, CC, SHO), pp. 2626–2629.
ICPRICPR-2012-LuoKM #3d #using
Endoscope 3-D motion tracking using an aggressive particle filtering for boosting electromagnetic guidance endoscopy (XL, TK, KM), pp. 117–120.
ICPRICPR-2012-MaLXS #detection #image #using
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPRICPR-2012-MartinezS #monitoring #using
Breath rate monitoring during sleep using near-ir imagery and PCA (MM, RS), pp. 3472–3475.
ICPRICPR-2012-McCloskeyD #detection #metadata #process #using #video
Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPRICPR-2012-MinKCK #approach #detection #higher-order #using
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MoriyamaAS #analysis #using
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-MotlicekSWMM #authentication #mobile #modelling #using #variability
Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
ICPRICPR-2012-MujumdarVK #framework #multi #novel #segmentation #using
A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
ICPRICPR-2012-NaitoKSS #using
Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPRICPR-2012-NakazawaMMNHYY #multi #re-engineering #using
Dynamic scene reconstruction using asynchronous multiple Kinects (MN, IM, YM, HN, HH, HY, YY), pp. 469–472.
ICPRICPR-2012-NarayanR #segmentation #using
Motion segmentation using curve fitting on Lagrangian particle trajectories (SN, KRR), pp. 3692–3695.
ICPRICPR-2012-NegrelPG #categorisation #image #using
Using spatial pyramids with compacted VLAT for image categorization (RN, DP, PHG), pp. 2460–2463.
ICPRICPR-2012-NgC #using #verification
Face verification using temporal affective cues (ESN, AYSC), pp. 1249–1252.
ICPRICPR-2012-NguyenVC #multi #recognition #using
Face recognition using Multi-modal Binary Patterns (TPN, NSV, AC), pp. 2343–2346.
ICPRICPR-2012-NiigakiSM #detection #using
Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPRICPR-2012-NikanA #recognition #using
Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
ICPRICPR-2012-OumerP #3d #estimation #image #using
3D point tracking and pose estimation of a space object using stereo images (NWO, GP), pp. 796–800.
ICPRICPR-2012-PalenichkaPKL #image #modelling #multi #using
Model-based extraction of image area descriptors using a multi-scale attention operator (RMP, MP, YK, AL), pp. 853–856.
ICPRICPR-2012-PerdigotoA #3d #image #re-engineering #using
Reconstruction of 3D lines from a single axial catadioptric image using cross-ratio (LP, HA), pp. 857–860.
ICPRICPR-2012-PerezMMSV #recognition #using
Combining gradient histograms using orientation tensors for human action recognition (EdAP, VFM, LMM, DOS, MBV), pp. 3460–3463.
ICPRICPR-2012-PhanST #detection #symmetry #using
Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPRICPR-2012-PorwalZG #network #recognition #using
Handwritten Arabic text recognition using Deep Belief Networks (UP, YZ, VG), pp. 302–305.
ICPRICPR-2012-RebagliatiSPS #distance #edit distance #graph #set #using
Computing the graph edit distance using dominant sets (NR, ASR, MP, FS), pp. 1080–1083.
ICPRICPR-2012-ReinbacherRB #game studies #named #using
RoμNect: Hand mounted depth sensing using a commodity gaming sensor (CR, MR, HB), pp. 461–464.
ICPRICPR-2012-RiechertZMK #estimation #hybrid #realtime #recursion #using
Real-time disparity estimation using line-wise hybrid recursive matching and cross-bilateral median up-sampling (CR, FZ, MM, PK), pp. 3168–3171.
ICPRICPR-2012-RodriguesPBPM #image #multi #segmentation #towards #using
Towards breast ultrasound image segmentation using multi-resolution pixel descriptors (RR, AMGP, RB, MP, JM), pp. 2833–2836.
ICPRICPR-2012-RohithK #3d #estimation #modelling #using
Augmenting monocular motion estimation using intermittent 3D models from depth sensors (MVR, CK), pp. 473–476.
ICPRICPR-2012-RoyH #classification #component #detection #documentation #image #using
Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPRICPR-2012-SankaranJ #network #recognition #using
Recognition of printed Devanagari text using BLSTM Neural Network (NS, CVJ), pp. 322–325.
ICPRICPR-2012-SantosPTGPF #classification #image #multi #using #visual notation #word
Improving texture description in remote sensing image multi-scale classification tasks by using visual words (JAdS, OABP, RdST, PHG, SPF, AXF), pp. 3090–3093.
ICPRICPR-2012-SchmeingJ #optimisation #using
Faithful Spatio-Temporal disocclusion filling using local optimization (MS, XJ), pp. 3799–3802.
ICPRICPR-2012-SchuldhausKJESL #classification #using
Classification of surfaces and inclinations during outdoor running using shoe-mounted inertial sensors (DS, PK, UJ, BE, HS, ML), pp. 2258–2261.
ICPRICPR-2012-ShenZ #3d #recognition #using
Hyperspectral face recognition using 3D Gabor wavelets (LS, SZ), pp. 1574–1577.
ICPRICPR-2012-ShibataK #modelling #recognition #using
Emotion recognition modeling of sitting postures by using pressure sensors and accelerometers (TS, YK), pp. 1124–1127.
ICPRICPR-2012-ShinPJB #detection #using
Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPRICPR-2012-SimoesSW #detection #image #using
Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPRICPR-2012-SoranHLS #detection #using
Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPRICPR-2012-SuLT #documentation #framework #image #learning #markov #random #using
A learning framework for degraded document image binarization using Markov Random Field (BS, SL, CLT), pp. 3200–3203.
ICPRICPR-2012-SuYLW #bound #classification #editing #using
Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPRICPR-2012-SvarmSEO #image #using
Point track creation in unordered image collections using Gomory-Hu trees (LS, ZS, OE, CO), pp. 2116–2119.
ICPRICPR-2012-TajimaIA #3d #correlation #using
A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPRICPR-2012-TangS #independence #learning #network #performance #testing #using
Efficient and accurate learning of Bayesian networks using chi-squared independence tests (YT, SNS), pp. 2723–2726.
ICPRICPR-2012-ThanhMNMY #detection #recognition #robust #using
Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPRICPR-2012-TianC12a #image #optimisation #using
Depth image up-sampling using ant colony optimization (JT, LC), pp. 3795–3798.
ICPRICPR-2012-TsuboshitaKFO #adaptation #image #using
Image annotation using adapted Gaussian mixture model (YT, NK, MF, MO), pp. 1346–1350.
ICPRICPR-2012-TsuruKO #using
Mixed-reality snapshot system using environmental depth sensors (HT, IK, YO), pp. 97–100.
ICPRICPR-2012-UddinCKS #using
Accurate genomic signal recovery using compressed sensing (BU, MEC, HAK, GS), pp. 3144–3147.
ICPRICPR-2012-Ugurlu #detection #using
Head posture detection using skin and hair information (YU), pp. 1–4.
ICPRICPR-2012-ValevY #classification #clustering #graph #using
Classification using graph partitioning (VV, NY), pp. 1261–1264.
ICPRICPR-2012-VaradarajanV #semantics #using #visual notation
Semantic saliency using k-TR theory of visual perception (KMV, MV), pp. 3676–3679.
ICPRICPR-2012-VillamizarGSM #learning #online #random #using
Online human-assisted learning using Random Ferns (MV, AG, AS, FMN), pp. 2821–2824.
ICPRICPR-2012-VitaladevuniCPN #detection #documentation #image #using
Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPRICPR-2012-WangCCP #detection #realtime #using
Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPRICPR-2012-WangHWZ #classification #gender #using
Facial image-based gender classification using Local Circular Patterns (CW, DH, YW, GZ), pp. 2432–2435.
ICPRICPR-2012-WangOJBK #using
Tracking Tetrahymena pyriformis cells using decision trees (QW, YO, AAJ, KLB, MK), pp. 1843–1847.
ICPRICPR-2012-WeibelDWR #detection #graph #using
Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPRICPR-2012-WittW #programming #using
Sparse stereo by edge-based search using dynamic programming (JW, UW), pp. 3631–3635.
ICPRICPR-2012-XiaSF #towards #using #verification #visual notation
Toward kinship verification using visual attributes (SX, MS, YF), pp. 549–552.
ICPRICPR-2012-XuanSCS #algorithm #using
An Enhanced EM algorithm using maximum entropy distribution as initial condition (GX, YQS, PC, PS), pp. 849–852.
ICPRICPR-2012-XuGN #image #using
Morphological filtering in shape spaces: Applications using tree-based image representations (YX, TG, LN), pp. 485–488.
ICPRICPR-2012-YagiMM #online #retrieval #robust #similarity #using
Robust on-line handwritten object retrieval using a similarity measure based on overlap area of circles (TY, HM, MM), pp. 721–724.
ICPRICPR-2012-YangZLP #3d #optimisation #using
Coupled 3D tracking and pose optimization of rigid objects using particle filter (HY, YZ, XL, IP), pp. 1451–1454.
ICPRICPR-2012-YlioinasHP #classification #using
Age Classification in Unconstrained Conditions Using LBP Variants (JY, AH, MP), pp. 1257–1260.
ICPRICPR-2012-Yu #locality #using #video
Localization and extraction of the four clock-digits using the knowledge of the digital video clock (XY), pp. 1217–1220.
ICPRICPR-2012-ZarifFR #image #multi #performance #similarity #using
Fast and efficient multichannel image completion using local similarity (SZ, IF, DR), pp. 3116–3119.
ICPRICPR-2012-ZhangFWZJ #image #scalability #using
Scalable image co-segmentation using color and covariance features (SZ, WF, LW, JZ, JJ), pp. 3708–3711.
ICPRICPR-2012-ZhangH #feature model #recognition #using
Face recognition using semi-supervised spectral feature selection (ZZ, ERH), pp. 1294–1297.
ICPRICPR-2012-ZhangH12b #estimation #using
Simultaneous reflectance estimation and surface shape recovery using polarisation (LZ, ERH), pp. 1876–1879.
ICPRICPR-2012-ZhangL #detection #using
Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPRICPR-2012-ZhangLM #composition #multi #recognition #using
Multi-subregion face recognition using coarse-to-fine Quad-tree decomposition (CZ, XL, TM), pp. 1004–1007.
ICPRICPR-2012-ZhangXSS #modelling #process #recognition #representation #smarttech #using
Sparse representation for motion primitive-based human activity modeling and recognition using wearable sensors (MZ, WX, AAS, MS), pp. 1807–1810.
ICPRICPR-2012-ZhuoCQYX #algorithm #classification #image #learning #using
Image classification using HTM cortical learning algorithms (WZ, ZC, YQ, ZY, YX), pp. 2452–2455.
ICPRICPR-2012-ZhuW #gesture #kernel #recognition #using
Single-frame hand gesture recognition using color and depth kernel descriptors (XZ, KYKW), pp. 2989–2992.
ICPRICPR-2012-ZillyRMWSK #multi #using
Multi-camera rectification using linearized trifocal tensor (FZ, CR, MM, WW, TS, PK), pp. 2727–2731.
ICPRICPR-2012-ZouKR #image #segmentation #semantics #using
Semantic image segmentation using region bank (WZ, KK, JR), pp. 922–925.
KDDKDD-2012-BoleyMG #linear #using
Linear space direct pattern sampling using coupling from the past (MB, SM, TG), pp. 69–77.
KDDKDD-2012-CorreaL #clustering #graph #using
Locally-scaled spectral clustering using empty region graphs (CDC, PL), pp. 1330–1338.
KDDKDD-2012-GunnemannFS #clustering #modelling #multi #using
Multi-view clustering using mixture models in subspace projections (SG, IF, TS), pp. 132–140.
KDDKDD-2012-HiraiY #clustering #detection #normalisation #using
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-KimLX #image #multi #predict #process #using #web
Web image prediction using multivariate point processes (GK, FFL, EPX), pp. 1068–1076.
KDDKDD-2012-LiLP #coordination #performance #using
Fast bregman divergence NMF using taylor expansion and coordinate descent (LL, GL, HP), pp. 307–315.
KDDKDD-2012-RamG #using
Maximum inner-product search using cone trees (PR, AGG), pp. 931–939.
KDDKDD-2012-YuanZX #using
Discovering regions of different functions in a city using human mobility and POIs (JY, YZ, XX), pp. 186–194.
KDIRKDIR-2012-ArbelaitzGLMPP #adaptation #clustering #mining #navigation #profiling #using
Adaptation of the User Navigation Scheme using Clustering and Frequent Pattern Mining Techiques for Profiling (OA, IG, AL, JM, JMP, IP), pp. 187–192.
KDIRKDIR-2012-BallEC #named #open source #social #using
Undermining — Social Engineering using Open Source Intelligence Gathering (LB, GE, NC), pp. 275–280.
KDIRKDIR-2012-BhattacharjeeBG #data mining #mining #network #optimisation #using
Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization (SB, FB, RDG), pp. 319–323.
KDIRKDIR-2012-ChueaphunKMC #nearest neighbour #random #recognition #using
Lanna Dharma Printed Character Recognition using k-Nearest Neighbor and Conditional Random Fields (CC, AK, SM, JC), pp. 169–174.
KDIRKDIR-2012-DuarteFD #clustering #constraints #using
Evidence Accumulation Clustering using Pairwise Constraints (JMMD, ALNF, FJFD), pp. 293–299.
KDIRKDIR-2012-FormosoFCC #performance #recommendation #using
Using Neighborhood Pre-computation to Increase Recommendation Efficiency (VF, DF, FC, VC), pp. 333–335.
KDIRKDIR-2012-HavaSK #classification #documentation #network #semantics
Contextual Latent Semantic Networks used for Document Classification (OH, MS, PK), pp. 425–430.
KDIRKDIR-2012-IkebeKT #learning #predict #smarttech #using
Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
KDIRKDIR-2012-MedinaFRF #semantics #using #wiki
Measuring Entity Semantic Relatedness using Wikipedia (LASM, ALNF, RR, JF), pp. 431–437.
KDIRKDIR-2012-Potuzak #algorithm #network #optimisation #search-based #using
Issues of Optimization of a Genetic Algorithm for Traffic Network Division using a Genetic Algorithm (TP), pp. 340–343.
KEODKEOD-2012-AbdelazzizN #ontology #recommendation #using
Enhancing the Results of Recommender Systems using Implicit Ontology Relations (LA, KN), pp. 5–14.
KEODKEOD-2012-BachaZ12a #design #education
Designing a Model of Arabic Derivation, for Use in Computer Assisted Teaching (KB, MZ), pp. 352–356.
KEODKEOD-2012-DiasMS #enterprise #health #ontology #using
Using Enterprise Ontology for Improving the National Health System — Demonstrated in the Case of a Pharmacy and an Emergency Department (DGD, CM, MMdS), pp. 441–451.
KEODKEOD-2012-GirardiAG #framework #independence #ontology #using
An Ontology-based Data Acquisition Infrastructure — Using Ontologies to Create Domain-independent Software Systems (DG, KA, MG), pp. 155–160.
KEODKEOD-2012-HmidaCBN #3d #logic #using
From 9-IM Topological Operators to Qualitative Spatial Relations using 3D Selective Nef Complexes and Logic Rules for Bodies (HBH, CC, FB, CN), pp. 208–213.
KEODKEOD-2012-KawtrakulMCRPNK #latency #social #social media #using
Improving Disaster Responsiveness using a Mix of Social Media and e-Government (AK, IM, HC, SR, KP, MN, VK), pp. 423–426.
KEODKEOD-2012-KhairMZ #data mining #education #mining #roadmap #student #using
Creating an Educational Roadmap for Engineering Students via an Optimal and Iterative Yearly Regression Tree using Data Mining (MK, CEM, WZ), pp. 43–52.
KEODKEOD-2012-LiangCI #approach #development #using
A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEODKEOD-2012-MendesASS #using
Using DEMO-based SLAs for Improving City Council Services (CM, MA, NS, MMdS), pp. 431–440.
KEODKEOD-2012-NogueiraG #programming #set #using
Recall-driven Product Tracing and Supply Chain Tracking using Answer Set Programming (MLN, NPG), pp. 125–133.
KEODKEOD-2012-SchlenoffFB #approach #ontology #recognition #using
An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEODKEOD-2012-SuzukiF #bibliography #segmentation #similarity #using #word
Segmentation of Review Texts by using Thesaurus and Corpus-based Word Similarity (YS, FF), pp. 381–384.
KMISKMIS-2012-Borchardt #information management #social #social media #using
Using Social Media for Knowledge Management in SME (UB), pp. 31–39.
KMISKMIS-2012-HamadaAS #generative #learning #using
A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMISKMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #scalability #tool support #using
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMISKMIS-2012-MenasselM #case study #formal method #novel #process
A Novel Formalization Process for Use Case Maps (YM, FM), pp. 307–310.
KMISKMIS-2012-NgocIC #case study #modelling #using
Modeling of Indicators using UTL — A Study Case with Hop3x System (DPTN, SI, CC), pp. 269–272.
KMISKMIS-2012-OtsukiAS #using
An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KRKR-2012-ChaudhriS #knowledge base #programming #reasoning #set #specification #using
Specifying and Reasoning with Underspecified Knowledge Bases Using Answer Set Programming (VKC, TCS).
KRKR-2012-MorettiT #ranking #set #using
Ranking Sets of Possibly Interacting Objects Using Shapley Extensions (SM, AT).
MLDMMLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation #using
EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDMMLDM-2012-CarvalhoPS #classification #image #using
Classification of Breast Tissues in Mammographic Images in Mass and Non-mass Using McIntosh’s Diversity Index and SVM (PMdSC, ACdP, ACS), pp. 482–494.
MLDMMLDM-2012-KalpakisYHMSSS #analysis #permutation #predict #using
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDMMLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining #using
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-Moreira-MatiasMGB #categorisation #classification #matrix #using
Text Categorization Using an Ensemble Classifier Based on a Mean Co-association Matrix (LMM, JMM, JG, PB), pp. 525–539.
MLDMMLDM-2012-NascimentoPS #classification #image #using
Lung Nodules Classification in CT Images Using Shannon and Simpson Diversity Indices and SVM (LBN, ACdP, ACS), pp. 454–466.
MLDMMLDM-2012-SapkotaBS #grammar inference #principle #using
Unsupervised Grammar Inference Using the Minimum Description Length Principle (US, BRB, APS), pp. 141–153.
MLDMMLDM-2012-SinghCS #approach #hybrid #performance #recognition #using
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDMMLDM-2012-TaTB #approach #clustering #data type #using
Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDMMLDM-2012-VlaseMI #clustering #metadata #using
Improvement of K-means Clustering Using Patents Metadata (MV, DM, AI), pp. 293–305.
MLDMMLDM-2012-XuCG #concept #learning #multi #using
Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy (TX, DKYC, IG), pp. 169–182.
RecSysRecSys-2012-BelloginP #clustering #collaboration #graph #using
Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
RecSysRecSys-2012-DeDGM #difference #learning #using
Local learning of item dissimilarity using content and link structure (AD, MSD, NG, PM), pp. 221–224.
RecSysRecSys-2012-Lathia #health #using
Using ratings to profile your health (NL), pp. 303–304.
RecSysRecSys-2012-Ninaus #heuristic #recommendation #requirements #using
Using group recommendation heuristics for the prioritization of requirements (GN), pp. 329–332.
RecSysRecSys-2012-PhelanMS #named #realtime #twitter #using
Yokie: explorations in curated real-time search & discovery using twitter (OP, KM, BS), pp. 307–308.
RecSysRecSys-2012-YangSGL #network #on the #recommendation #social #using
On top-k recommendation using social networks (XY, HS, YG, YL), pp. 67–74.
SEKESEKE-2012-AlvesGBMA #named #using
SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
SEKESEKE-2012-AnguswamyF #case study #component #reuse
An Exploratory Study of One-Use and Reusable Software Components (RA, WBF), pp. 194–219.
SEKESEKE-2012-DagninoSR #fault #machine learning #using
Forecasting Fault Events in Power Distribution Grids Using Machine Learning (AD, KS, LR), pp. 458–463.
SEKESEKE-2012-DingS #architecture #collaboration #mobile #using
Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
SEKESEKE-2012-El-SherifFE #concept #learning #multi #network #social #using
Using Social Networks for Learning New Concepts in Multi-Agent Systems (SMES, BHF, AE), pp. 261–266.
SEKESEKE-2012-FarfelederMK #elicitation #locality #requirements #semantics #using
Using Semantic Relatedness and Locality for Requirements Elicitation Guidance (SF, TM, AK), pp. 19–24.
SEKESEKE-2012-FreireCAK #monitoring #process #statistics #using #workflow
Software Process Monitoring Using Statistical Process Control Integrated in Workflow Systems (MAF, DAdC, EA, UK), pp. 557–562.
SEKESEKE-2012-HuangL
A Goal-Driven Method for Selecting Issues Used in Agent Negotiation (YCH, AL), pp. 759–762.
SEKESEKE-2012-HumayunG #empirical #trust #using
An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SEKESEKE-2012-JangidPE #analysis #mobile #predict #sentiment #using
A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKESEKE-2012-Lozano-FuentesGBSEWHGT #using
Using Cell Phones for Mosquito Vector Surveillance and Control (SLF, SG, JMB, DS, LE, FW, EHG, JGR, DTC), pp. 763–767.
SEKESEKE-2012-MarchettiG #framework #logic #model transformation #using
Model Transformation for Frameworks Using Logical Planning (GAM, ESG), pp. 563–569.
SEKESEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification #using
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-PittoliSN #monitoring #network
Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software Projects (FP, ALRdS, DJN), pp. 570–573.
SEKESEKE-2012-RiveroC #usability #using #web
Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKESEKE-2012-SalamahEO #automaton #consistency #ltl #using
Consistency Checks of System Properties Using LTL and Büchi Automata (SS, ME, OO), pp. 39–44.
SEKESEKE-2012-SalamiA #algorithm #diagrams #framework #retrieval #search-based #using
A Framework for Class Diagram Retrieval Using Genetic Algorithm (HOS, MAA), pp. 737–740.
SEKESEKE-2012-ShinKKJR #configuration management #dependence #impact analysis #using
Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
SEKESEKE-2012-SunLTZ #impact analysis #testing #using
Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
SEKESEKE-2012-VieiraVNC #elicitation #empirical #using
Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
SEKESEKE-2012-ZhuLLCZJ #continuation #difference #logic #using #verification
HybridUML Based Verification of CPS Using Differential Dynamic Logic (MZ, BL, JL, QC, XZ, SJ), pp. 235–238.
SIGIRSIGIR-2012-BenderskyC #dependence #higher-order #information retrieval #modelling #query #using
Modeling higher-order term dependencies in information retrieval using query hypergraphs (MB, WBC), pp. 941–950.
SIGIRSIGIR-2012-ChaC #analysis #modelling #topic #using
Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIRSIGIR-2012-ChandarC #documentation #novel #retrieval #using
Using preference judgments for novel document retrieval (PC, BC), pp. 861–870.
SIGIRSIGIR-2012-ChandarC12a #rank #using
Using PageRank to infer user preferences (PC, BC), pp. 1167–1168.
SIGIRSIGIR-2012-Cummins #modelling #monte carlo #performance #predict #simulation #using
Investigating performance predictors using monte carlo simulation and score distribution models (RC), pp. 1097–1098.
SIGIRSIGIR-2012-Ghosh #information retrieval #using
Improving e-discovery using information retrieval (KG), p. 996.
SIGIRSIGIR-2012-HuangWBW #modelling #process #using
Improving searcher models using mouse cursor activity (JH, RWW, GB, KW), pp. 195–204.
SIGIRSIGIR-2012-HuO #classification #dataset #using
Genre classification for million song dataset using confidence-based classifiers combination (YH, MO), pp. 1083–1084.
SIGIRSIGIR-2012-Khatiban #mining #trust #using
Building reputation and trust using federated search and opinion mining (SK), p. 994.
SIGIRSIGIR-2012-Ko #case study #classification #using
A study of term weighting schemes using class information for text classification (YK), pp. 1029–1030.
SIGIRSIGIR-2012-LieblingBW #using
Anticipatory search: using context to initiate search (DJL, PNB, RWW), pp. 1035–1036.
SIGIRSIGIR-2012-LiuBC #behaviour #interactive #personalisation #using
Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
SIGIRSIGIR-2012-MahdabiAKC #automation #concept #predict #query #refinement #using
Automatic refinement of patent queries using concept importance predictors (PM, LA, MK, FC), pp. 505–514.
SIGIRSIGIR-2012-MarquesL #information retrieval #java #using #visual notation
Visual information retrieval using Java and LIRE (OM, ML), p. 1193.
SIGIRSIGIR-2012-MinLLSJ #image #multi #using
Multi-platform image search using tag enrichment (JM, CL, JL, DS, GJFJ), p. 1018.
SIGIRSIGIR-2012-ONeil #ranking #sentiment #using
Entity sentiment extraction using text ranking (JO), p. 1024.
SIGIRSIGIR-2012-ShuklaLT #using
Parallelizing ListNet training using spark (SS, ML, AT), pp. 1127–1128.
SIGIRSIGIR-2012-Sun #classification #using #word
Short text classification using very few words (AS), pp. 1145–1146.
SIGIRSIGIR-2012-TranF #information retrieval #interactive #using
Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
ECMFAECMFA-2012-BurtonPRKPS #modelling #problem #using
Solving Acquisition Problems Using Model-Driven Engineering (FRB, RFP, LMR, DSK, SMP, SS), pp. 428–443.
ICMTICMT-2012-SenMTC #model transformation #modelling #using
Using Models of Partial Knowledge to Test Model Transformations (SS, JMM, MT, JC), pp. 24–39.
ICMTICMT-2012-VallecilloG #model transformation #type system #using
Typing Model Transformations Using Tracts (AV, MG), pp. 56–71.
MODELSMoDELS-2012-AranegaEM #feature model #model transformation #using
Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
MODELSMoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #using #verification
On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
MODELSMoDELS-2012-AranegaEM #feature model #model transformation #using
Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
MODELSMoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #using #verification
On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
ECOOPECOOP-2012-NegaraVCJD #evolution #question #source code #version control
Is It Dangerous to Use Version Control Histories to Study Source Code Evolution? (SN, MV, NC, REJ, DD), pp. 79–103.
OOPSLAOOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management #using
Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
OOPSLAOOPSLA-2012-BocqD #monad #named #network #process #streaming #using #virtual machine
Molecule: using monadic and streaming I/O to compose process networks on the JVM (SB, KD), pp. 315–334.
OOPSLAOOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem #using
Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
OOPSLAOOPSLA-2012-RosuS #logic #reachability #using
Checking reachability using matching logic (GR, AS), pp. 555–574.
OOPSLAOOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation #using
Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
TOOLSTOOLS-EUROPE-2012-MehnertA #type system #using #verification
Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
TOOLSTOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language #using
Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
PPDPPPDP-2012-SulzmannL #regular expression #using
Regular expression sub-matching using partial derivatives (MS, KZML), pp. 79–90.
QAPLQAPL-2012-BelardinelliGL #automation #protocol #quantum #using #verification
Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
PADLPADL-2012-BalducciniL #aspect-oriented #tool support
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools (MB, YL), pp. 78–92.
PADLPADL-2012-GillN #logic #using
Handshaking in Kansas Lava Using Patch Logic (AG, BN), pp. 212–226.
PADLPADL-2012-HaveC #performance #program transformation #using
Efficient Tabling of Structured Data Using Indexing and Program Transformation (CTH, HC), pp. 93–107.
RERE-2012-BerenbachSN #industrial #modelling #requirements
The use of a requirements modeling language for industrial applications (BB, FS, HN), pp. 285–290.
RERE-2012-FerrariG #detection #using
Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RERE-2012-Ott #fault #legacy #natural language #specification #using
Defects in natural language requirement specifications at Mercedes-Benz: An investigation using a combination of legacy data and expert opinion (DO), pp. 291–296.
REFSQREFSQ-2012-DaramolaMSB #perspective #reasoning #requirements #research #semantics #using
Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview (OD, TM, GS, SB), pp. 172–178.
SACSAC-PL-J-2009-J-CervelleFLR12 #implementation #parsing #using
Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers (JC, RF, GL, GR), pp. 990–1005.
SACSAC-2012-AbdullahRTN #performance #using
Efficient matching of SPARQL subscriptions using rete (HA, MR, ST, EN), pp. 372–377.
SACSAC-2012-BernardiH #contract #modelling #using
Modelling session types using contracts (GB, MH), pp. 1941–1946.
SACSAC-2012-CarvalhoSG #adaptation #fuzzy #segmentation #using
Texture fuzzy segmentation using adaptive affinity functions (BMC, TSS, EG), pp. 51–53.
SACSAC-2012-ChenGZG #metric #network #similarity #using
Discovering missing links in networks using vertex similarity measures (HHC, LG, X(Z, CLG), pp. 138–143.
SACSAC-2012-ChenZD #algorithm #effectiveness #search-based #segmentation #using
Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm (ZC, BZ, SD), pp. 54–55.
SACSAC-2012-ChhelLGS #biology #multi #using
Minimum multiple characterization of biological data using partially defined boolean formulas (FC, FL, AG, FS), pp. 1399–1405.
SACSAC-2012-ChoeYYR #algorithm #automation #realtime #scheduling #search-based #using
Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm (RC, HY, YY, KRR), pp. 238–243.
SACSAC-2012-ChunM #health #integration #semantics #social #using #web
Social health data integration using semantic Web (SAC, BM), pp. 392–397.
SACSAC-2012-DasguptaK #analysis #precise #using
Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SACSAC-2012-DavtyanKMRS #encryption
Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
SACSAC-2012-DayehH #biology #network #using
Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
SACSAC-2012-DiasDHS #sorting #symmetry #using
Sorting genomes using almost-symmetric inversions (ZD, UD, LSH, JCS), pp. 1368–1374.
SACSAC-2012-FkiJST #approach #composition #flexibility #using
A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
SACSAC-2012-FouqueLV #fault #using
Using faults for buffer overflow effects (PAF, DL, FV), pp. 1638–1639.
SACSAC-2012-HasegawaT #distance #invariant #using
Affine invariant shape matching using radon transform and dynamic time warping distance (MH, ST), pp. 777–781.
SACSAC-2012-HopRFH #ontology #using #visualisation
Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW (WH, SdR, FF, FH), pp. 304–311.
SACSAC-2012-KamieHK #clustering #effectiveness #using #video #web
Effective web video clustering using playlist information (MK, TH, HK), pp. 949–956.
SACSAC-2012-KangJC #3d #scalability #using #video
Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SACSAC-2012-KuttyCN #modelling #recommendation #using
A people-to-people recommendation system using tensor space models (SK, LC, RN), pp. 187–192.
SACSAC-2012-MaamarFLH #implementation #social #specification #using #web #web service
Specifying and implementing social Web services operation using commitments (ZM, NF, ML, SH), pp. 1955–1960.
SACSAC-2012-MahdianGTM #smarttech #using
Location based routing using smartphones in an infrastructureless environment (AM, HG, ST, SM), pp. 594–599.
SACSAC-2012-MajchrzakS #agile #development #testing #using #web
Using spring Roo for the test-driven development of Web applications (TAM, AS), pp. 664–671.
SACSAC-2012-MaloneG #case study #groovy
A case study in the use of Groovy and Grails (KM, JG), pp. 1254–1255.
SACSAC-2012-MaruhashiTT #identification
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-MbarekKPA #design #modelling #power management #using
Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design (OM, AK, AP, MA), pp. 1580–1587.
SACSAC-2012-MenorPB #kernel #predict #probability #using
Probabilistic prediction of protein phosphorylation sites using kernel machines (MM, GP, KB), pp. 1393–1398.
SACSAC-2012-NagarAB #functional #graph #similarity #using
Computing gene functional similarity using combined graphs (AN, HAM, SB), pp. 1381–1386.
SACSAC-2012-OliveiraCS #bound #on the #using
On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SACSAC-2012-OSullivanWL #design #integer #using
Designing data storage tier using Integer Programing (MJO, CGW, DL), pp. 426–433.
SACSAC-2012-ParraRMRDS #adaptation #constraints #optimisation #self #using #variability
Using constraint-based optimization and variability to support continuous self-adaptation (CAP, DR, SM, RR, LD, LS), pp. 486–491.
SACSAC-2012-QiCLHW #collaboration #using
Using inferred tag ratings to improve user-based collaborative filtering (QQ, ZC, JL, CH, QW), pp. 2008–2013.
SACSAC-2012-RajeDFRR #data access #implementation #ontology #using
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SACSAC-2012-ScandurraAYD #case study #functional #modelling #requirements #state machine #validation
Functional requirements validation by transforming use case models into Abstract State Machines (PS, AA, TY, MD), pp. 1063–1068.
SACSAC-2012-SchluterC #correlation #detection #markov #modelling #predict #using
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
SACSAC-2012-SouzaPEMOW #navigation #network #using
Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks (JRS, GP, GBE, CCTM, FSO, DFW), pp. 280–285.
SACSAC-2012-SwainCNB #analysis #markov #performance #using
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SACSAC-2012-TiwariG #case study #validation
Statechart-based use case requirement validation of event-driven systems (ST, AG), pp. 1091–1093.
SACSAC-2012-WickerPK #classification #composition #matrix #multi #using
Multi-label classification using boolean matrix decomposition (JW, BP, SK), pp. 179–186.
SACSAC-2012-ZaraketNSJ #architecture #library #parallel #source code #using
Portable Parallel Programs using architecture-aware libraries (FAZ, MN, MS, AJ), pp. 1922–1924.
FSEFSE-2012-OkurD #developer #how #library #parallel #question
How do developers use parallel libraries? (SO, DD), p. 54.
FSEFSE-2012-ZaeemK #generative #programming #using
Test input generation using dynamic programming (RNZ, SK), p. 34.
ICSEICSE-2012-AlkhalafBG #analysis #string #using #validation #verification
Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSEICSE-2012-Bavota #refactoring #semantics #using
Using structural and semantic information to support software refactoring (GB), pp. 1479–1482.
ICSEICSE-2012-CeccatoMMNT #debugging #effectiveness #empirical #random testing #testing
An empirical study about the effectiveness of debugging when random test cases are used (MC, AM, LM, CDN, PT), pp. 452–462.
ICSEICSE-2012-Chioasca #automation #machine learning #model transformation #requirements #using
Using machine learning to enhance automated requirements model transformation (EVC), pp. 1487–1490.
ICSEICSE-2012-CookHSS #compilation #composition #specification #using #verification
Specification engineering and modular verification using a web-integrated verifying compiler (CTC, HKH, HS, MS), pp. 1379–1382.
ICSEICSE-2012-Dilshener #concept #information retrieval #using
Improving information retrieval-based concept location using contextual relationships (TD), pp. 1499–1502.
ICSEICSE-2012-Ghardallou #analysis #invariant #termination #using
Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSEICSE-2012-Johnson #case study #question #static analysis #tool support #using #why
A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
ICSEICSE-2012-KimKKJ #approach #case study #industrial #testing #using
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
ICSEICSE-2012-McMillanHPCM #agile #prototype #recommendation #source code
Recommending source code for use in rapid software prototypes (CM, NH, DP, JCH, BM), pp. 848–858.
ICSEICSE-2012-Mendes #case study #elicitation #estimation #industrial #lessons learnt #using #web
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies (EM), pp. 1112–1121.
ICSEICSE-2012-NaganoNKAHUF #mining #repository #scalability #using
Using the GPGPU for scaling up Mining Software Repositories (RN, HN, YK, BA, KH, NU, AF), pp. 1435–1436.
ICSEICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial #using
Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
ICSEICSE-2012-SamirniSAMTH #automation #constraints #fault #generative #html #php #string #theorem proving #using
Automated repair of HTML generation errors in PHP applications using string constraint solving (HS, MS, SA, TDM, FT, LJH), pp. 277–287.
ICSEICSE-2012-Shang #developer #using
Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSEICSE-2012-SingerS #re-engineering #social #using
Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
ICSEICSE-2012-SongPF #interactive #named #using
iTree: Efficiently discovering high-coverage configurations using interaction trees (CS, AP, JSF), pp. 903–913.
ICSEICSE-2012-SusB #education #integration #re-engineering #using
Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSEICSE-2012-TreudeGGS #development #interactive #named #using #visualisation
WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment (CT, PG, LG, MADS), pp. 1399–1402.
ICSEICSE-2012-VakilianCNRBJ #automation #refactoring
Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
ICSEICSE-2012-Vetro #automation #identification #static analysis #technical debt #using
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSEICSE-2012-Yu #analysis #identification #using
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SLESLE-2012-AfroozehBBJMMS #gll #grammarware #semiparsing #using
Island Grammar-Based Parsing Using GLL and Tom (AA, JCB, MvdB, AJ, MM, PEM, ES), pp. 224–243.
SLESLE-2012-Storey #challenge #design #ontology #social #using
Addressing Cognitive and Social Challenges in Designing and Using Ontologies in the Biomedical Domain (MADS), pp. 1–3.
PLEASEPLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards #using
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
PLEASEPLEASE-2012-QuintonDHMC #feature model #modelling #using
Using feature modelling and automations to select among cloud solutions (CQ, LD, PH, SM, EC), pp. 17–20.
SPLCSPLC-2012-HeiderRGL #impact analysis #modelling #testing #using #variability
Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
ASPLOSASPLOS-2012-ClementsKZ #scalability #using
Scalable address spaces using RCU balanced trees (ATC, MFK, NZ), pp. 199–210.
ASPLOSASPLOS-2012-LeeS #architecture #scheduling #using
Region scheduling: efficiently using the cache architectures via page-level affinity (ML, KS), pp. 451–462.
ASPLOSASPLOS-2012-LinWLZ #named #power management #smarttech #using
Reflex: using low-power processors in smartphones without knowing them (FXL, ZW, RL, LZ), pp. 13–24.
CGOCGO-2012-ParkCA #graph #modelling #predict #using
Using graph-based program characterization for predictive modeling (EP, JC, MAA), pp. 196–206.
CGOCGO-2012-VankaT #data flow #dependence #performance #profiling #using
Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
HPCAHPCA-2012-BalakrishnanS #behaviour #named #probability #using
WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
HPCAHPCA-2012-BattleHHR #flexibility #using
Flexible register management using reference counting (SJB, ADH, MH, AR), pp. 273–284.
HPDCHPDC-2012-Budiu #artificial reality #big data #framework
Putting a “big-data” platform to good use: training kinect (MB), pp. 1–2.
HPDCHPDC-2012-DelamareFKL #distributed #named #using
SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures (SD, GF, DK, OL), pp. 173–186.
HPDCHPDC-2012-LeeWF #distributed #named #resource management #using
PonD: dynamic creation of HTC pool on demand using a decentralized resource discovery system (KL, DW, RJOF), pp. 161–172.
ISMMISMM-2012-OCallahan #memory management #question #using #web #why
Why is your web browser using so much memory? (RO), pp. 1–2.
LCTESLCTES-2012-KhudiaWM #embedded #fault #performance #using
Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
LCTESLCTES-2012-KyleBFLT #embedded #manycore #set #simulation #using
Efficiently parallelizing instruction set simulation of embedded multi-core processors using region-based just-in-time dynamic binary translation (SCK, IB, BF, HL, NPT), pp. 21–30.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named #using
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
PPoPPPPoPP-2012-TaoBB #development #gpu #kernel #scalability #using
Using GPU’s to accelerate stencil-based computation kernels for the development of large scale scientific applications on heterogeneous systems (JT, MB, SRB), pp. 287–288.
CAVCAV-2012-EsparzaGK #probability #proving #source code #termination #using
Proving Termination of Probabilistic Programs Using Patterns (JE, AG, SK), pp. 123–138.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime #using
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICLPICLP-2012-SchandaB #development #programming #set #using
Using Answer Set Programming in the Development of Verified Software (FS, MB), pp. 72–85.
ICLPICLP-2012-ZomboriCS #constraints #logic programming #static typing #type inference #using
Static Type Inference for the Q language using Constraint Logic Programming (ZZ, JC, PS), pp. 119–129.
ICLPICLP-J-2012-AreiasR #concurrent #multi #thread #towards #using
Towards multi-threaded local tabling using a common table space (MA, RR), pp. 427–443.
ICLPICLP-J-2012-BliemMW #declarative #named #problem #programming #using
D-FLAT: Declarative problem solving using tree decompositions and answer-set programming (BB, MM, SW), pp. 445–464.
ICSTICST-2012-AlesioGNB #constraints #optimisation #realtime #testing #using
Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
ICSTICST-2012-BorjessonF #automation #case study #comparative #industrial #testing #tool support #user interface #using #visual notation
Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry (EB, RF), pp. 350–359.
ICSTICST-2012-DucheneGRR #detection #fuzzing #model inference #using
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICSTICST-2012-EnderlinDGB #grammarware #php #testing #using
Grammar-Based Testing Using Realistic Domains in PHP (IE, FD, AG, FB), pp. 509–518.
ICSTICST-2012-GotliebHB #constraints #programming #using
Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
ICSTICST-2012-GrooteOW #formal method #using
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICSTICST-2012-JonssonBSE #automation #scalability #towards #using
Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
ICSTICST-2012-LiuNT #bound #case study #smt #using #verification
Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
ICSTICST-2012-MalikK #analysis #graph #using
Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICSTICST-2012-MalzJG #fuzzy #logic #testing #using
Prioritization of Test Cases Using Software Agents and Fuzzy Logic (CM, NJ, PG), pp. 483–486.
ICSTICST-2012-McMinnSS #data type #generative #query #search-based #string #using #web
Search-Based Test Input Generation for String Data Types Using the Results of Web Queries (PM, MS, MS), pp. 141–150.
ICSTICST-2012-Nguyen #comprehension #detection #performance #scalability #using
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICSTICST-2012-PapadakisT #fault #using
Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
ICSTICST-2012-RaposD #execution #generative #incremental #modelling #symbolic computation #testing #uml #using
Incremental Test Case Generation for UML-RT Models Using Symbolic Execution (EJR, JD), pp. 962–963.
ICSTICST-2012-ShakyaXLLKK #classification #combinator #testing #using
Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (KS, TX, NL, YL, RK, DRK), pp. 620–623.
ICSTICST-2012-WehbiOB #monitoring #security #using
Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
ICSTICST-2012-Wotawa #challenge #constraints #fault #open science #research #source code #using
Open Research Challenges of Localizing Faults in Programs Using Constraints (FW), pp. 770–771.
ICTSSICTSS-2012-LahamiKBJ #adaptation #architecture #design #distributed #problem #using
Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems (ML, MK, MB, MJ), pp. 103–118.
ICTSSICTSS-2012-TaylorHBD #behaviour #testing #using
Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
IJCARIJCAR-2012-JacquelBDD #automation #deduction #modulo theories #proving #theorem proving #using #verification
Tableaux Modulo Theories Using Superdeduction — An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover (MJ, KB, DD, CD), pp. 332–338.
ISSTAISSTA-2012-CaballeroGMN #detection #named #pointer
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICSLICS-2012-GrigorieffV #algorithm #bound #using
Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
ICSTSAT-2012-AbalCHP #problem #term rewriting #using
Using Term Rewriting to Solve Bit-Vector Arithmetic Problems — (Poster Presentation) (IA, AC, JH, JSP), pp. 493–495.
ICSTSAT-2012-TanjoTB #csp #encoding #named #order #satisfiability #using
Azucar: A SAT-Based CSP Solver Using Compact Order Encoding — (Tool Presentation) (TT, NT, MB), pp. 456–462.
TAPTAP-2012-BengoleaAMF #bound #test coverage #testing #using
Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
TAPTAP-2012-SenniF #constraints #data type #generative #logic programming #testing #using
Generation of Test Data Structures Using Constraint Logic Programming (VS, FF), pp. 115–131.
CBSECBSE-2011-TambeG #component #distributed #embedded #realtime #using
Rectifying orphan components using group-failover in distributed real-time and embedded systems (ST, ASG), pp. 139–148.
ECSAECSA-2011-BruckmannGP #architecture #enterprise #monitoring #realtime #towards #using
Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers (TB, VG, MP), pp. 287–294.
ECSAECSA-2011-NavarroCPR #architecture #model transformation #using
Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
ECSAECSA-2011-SilvaB #architecture #specification #using
A Model for Specifying Rationale Using an Architecture Description Language (LdS, DB), pp. 319–327.
ECSAECSA-2011-TibermacineZ #evolution #quality #requirements #using #web #web service
Supervising the Evolution of Web Service Orchestrations Using Quality Requirements (CT, TZ), pp. 1–16.
WICSAWICSA-2011-TsakirisKM #case study #evaluation #hybrid #industrial #plugin #quality
Evaluation of the Use of Quality Attribute Scenarios in a Plug-In Hybrid Electric Vehicle Controls System — Industrial Case Study (AT, JK, RM), pp. 66–72.
WICSAWICSA-2011-Woods #architecture #assessment #industrial #using
Industrial Architectural Assessment Using TARA (EW), pp. 56–65.
ASEASE-2011-AlshahwanH #automation #re-engineering #testing #using #web
Automated web application testing using search based software engineering (NA, MH), pp. 3–12.
ASEASE-2011-AlvesGJd #impact analysis #slicing #using
Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
ASEASE-2011-ApelSWRB #detection #feature model #interactive #using #verification
Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASEASE-2011-Bandyopadhyay #fault #locality #testing #using
Improving spectrum-based fault localization using proximity-based weighting of test cases (AB), pp. 660–664.
ASEASE-2011-GarciaPMMC #architecture #using
Enhancing architectural recovery using concerns (JG, DP, CM, NM, YC), pp. 552–555.
ASEASE-2011-KhalekYZMK #alloy #java #named #source code #specification #testing #using
TestEra: A tool for testing Java programs using alloy specifications (SAK, GY, LZ, DM, SK), pp. 608–611.
ASEASE-2011-LutzJP #assurance #modelling #using
Using model-based assurance to strengthen diagnostic procedures (RRL, JJ, APH), pp. 516–519.
ASEASE-2011-RathfelderKE #automation #capacity #performance #predict #using
Capacity planning for event-based systems using automated performance predictions (CR, SK, DE), pp. 352–361.
ASEASE-2011-SagdeoAKV #clustering #invariant #named #using
PRECIS: Inferring invariants using program path guided clustering (PS, VA, SK, SV), pp. 532–535.
ASEASE-2011-StehleLSRM #geometry #using
Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
ASEASE-2011-SunL #concept analysis #using
Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
ASEASE-2011-VakiliD #declarative #model checking #modelling #using
Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
ASEASE-2011-Witten #documentation #how #representation #semantics #wiki
Wikipedia and how to use it for semantic document representation (IHW), p. 1.
CASECASE-2011-BoemPFP #clustering #distance #multi #using
Multi-feature trajectory clustering using Earth Mover’s Distance (FB, FAP, GF, TP), pp. 310–315.
CASECASE-2011-CabasinoGSSZ #fault #petri net #using
Fault diagnosis of an ABS system using Petri nets (MPC, AG, CS, AS, KZ), pp. 594–599.
CASECASE-2011-FantiSU #constraints #problem #scheduling #symmetry #using
Solving scheduling problems in distribution centers using symmetry breaking constraints (MPF, GS, WU), pp. 58–65.
CASECASE-2011-FeiMA #automaton #finite #modelling #resource management #using
Modeling sequential resource allocation systems using Extended Finite Automata (ZF, SM, ), pp. 444–449.
CASECASE-2011-GhomriA #hybrid #petri net #using
Continuous flow systems and control methodology using Hybrid Petri nets (LG, HA), pp. 419–424.
CASECASE-2011-HajiD #case study #simulation #using
A simulation case study: Reducing outpatient waiting time of otolaryngology care services using VBA (MH, HD), pp. 525–530.
CASECASE-2011-HaoD #incremental #optimisation #using
Optimization of tool trajectory for Incremental Sheet Forming using closed loop control (WH, SD), pp. 779–784.
CASECASE-2011-HeoOP #locality #mobile #using
A localization system of mobile robots using artificial landmarks (DHH, ARO, THP), pp. 139–144.
CASECASE-2011-JamesBHACC #mining #mobile #using
Tele-operation of a mobile mining robot using a panoramic display: an exploration of operators sense of presence (CAJ, TPB, KH, LA, CC, AC), pp. 279–284.
CASECASE-2011-JulvezMV #analysis #simulation #using
Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASECASE-2011-KurzKP #maintenance #network #using
Dynamic Maintenance in semiconductor manufacturing using Bayesian networks (DK, JK, JP), pp. 238–243.
CASECASE-2011-LeeLNCC #design #optimisation
Design optimization of one-time-use leaping mechanism for sensor node relocation (GL, GL, YN, NYC, DC), pp. 749–754.
CASECASE-2011-MohanSBKE #3d #image #using
3D scanning of object surfaces using structured light and a single camera image (SM, KBS, IB, VK, RDE), pp. 151–156.
CASECASE-2011-RatnakarZ #detection #using
An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASECASE-2011-StyliosG #fuzzy #modelling #using
Modeling complex logistics systems using soft computing methodology of Fuzzy Cognitive Maps (CDS, GKG), pp. 72–77.
CASECASE-2011-UrliM #industrial #realtime
Use of Ethernet communications for real-time control systems in the metals industry (LU, SM), pp. 6–11.
CASECASE-2011-XieZSL #fuzzy #using
Position servo control of the slider in double toggle mechanical press using Bezier curve model and fuzzy control (JX, SZ, ZS, JL), pp. 773–778.
DACDAC-2011-GeQ #machine learning #multi #using
Dynamic thermal management for multimedia applications using machine learning (YG, QQ), pp. 95–100.
DACDAC-2011-GhaniN #branch #grid #power management #using #verification
Power grid verification using node and branch dominance (NHAG, FNN), pp. 682–687.
DACDAC-2011-HaddadN #analysis #grid #power management #using
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-KesturIPANC #architecture #co-evolution #design #framework #re-engineering #using
An algorithm-architecture co-design framework for gridding reconstruction using FPGAs (SK, KMI, SP, AAM, VN, CC), pp. 585–590.
DACDAC-2011-KuoSR #analysis #performance #reachability #source code #using
Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DACDAC-2011-LinH #satisfiability #using
Using SAT-based Craig interpolation to enlarge clock gating functions (THL, CY(H), pp. 621–626.
DACDAC-2011-MirandaRBW #design #modelling #standard #statistics #using
Statistical characterization of standard cells using design of experiments with response surface modeling (MM, PR, LB, GIW), pp. 77–82.
DACDAC-2011-NowrozWR #modelling #using
Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
DACDAC-2011-SorgenfreiS #detection #using
Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DACDAC-2011-TsaiZCH #bidirectional #fault tolerance #using
A fault-tolerant NoC scheme using bidirectional channel (WCT, DYZ, SJC, YHH), pp. 918–923.
DACDAC-2011-WangXAP #classification #learning #policy #power management #using
Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
DACDAC-2011-WeiP #security #using
Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DACDAC-2011-YangBC #detection #embedded #energy #fault #using
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATEDATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive #using
Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATEDATE-2011-AlordaTBS #embedded #optimisation #using
Stability optimization of embedded 8T SRAMs using Word-Line Voltage modulation (BA, GT, SAB, JS), pp. 986–991.
DATEDATE-2011-AmoryOMML #energy #using
Evaluating energy consumption of homogeneous MPSoCs using spare tiles (AMA, LO, CAMM, FGM, ML), pp. 1164–1167.
DATEDATE-2011-AsadiniaMTS #using
Supporting non-contiguous processor allocation in mesh-based CMPs using virtual point-to-point links (MA, MM, AT, HSA), pp. 413–418.
DATEDATE-2011-ButtrickK #3d #network #on the #testing #using
On testing prebond dies with incomplete clock networks in a 3D IC using DLLs (MB, SK), pp. 1418–1423.
DATEDATE-2011-DammHJPS #architecture #component #contract #design #integration #specification #testing #using
Using contract-based component specifications for virtual integration testing and architecture design (WD, HH, BJ, TP, IS), pp. 1023–1028.
DATEDATE-2011-EggersglusD #fault #generative #optimisation #pseudo #testing #using
As-Robust-As-Possible test generation in the presence of small delay defects using pseudo-Boolean optimization (SE, RD), pp. 1291–1296.
DATEDATE-2011-GoyalN #grid #performance #power management #using #verification
Efficient RC power grid verification using node elimination (AG, FNN), pp. 257–260.
DATEDATE-2011-GrammatikakisPSP #estimation #using
System-level power estimation methodology using cycle- and bit-accurate TLM (MDG, SP, JPS, CP), pp. 1125–1126.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KimCSY #modelling #parallel #performance #simulation #using
Temporal parallel simulation: A fast gate-level HDL simulation using higher level models (DK, MJC, KS, SY), pp. 1584–1589.
DATEDATE-2011-LiuHRG #optimisation #process #using
Global optimization of integrated transformers for high frequency microwave circuits using a Gaussian process based surrogate model (BL, YH, PR, GGEG), pp. 1101–1106.
DATEDATE-2011-LiuSTV #design #generative #towards #using #validation
Towards coverage closure: Using GoldMine assertions for generating design validation stimulus (LL, DS, WT, SV), pp. 173–178.
DATEDATE-2011-MeyerGCLS #cost analysis #execution #safety #using
Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
DATEDATE-2011-MeyerNHBSGSB #configuration management #performance #using
Fast Start-up for Spartan-6 FPGAs using Dynamic Partial Reconfiguration (JM, JN, MH, LB, OS, RMG, RS, JB), pp. 1542–1547.
DATEDATE-2011-NarayananZT #correctness #pattern matching #process #using
Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
DATEDATE-2011-SinghSG #generative #performance #testing #using
Testing of high-speed DACs using PRBS generation with “Alternate-Bit-Tapping” (MS, MS, SG), pp. 377–382.
DATEDATE-2011-VissersNN #interface #realtime #synthesis #tool support #using
Building real-time HDTV applications in FPGAs using processors, AXI interfaces and high level synthesis tools (KAV, SN, JN), pp. 848–850.
DATEDATE-2011-WangKAWMA #energy #simulation #using
Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
DATEDATE-2011-WangNKWRLMB #configuration management #using
High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches (XW, SN, ARK, FGW, SR, THL, MM, SB), pp. 1065–1070.
DATEDATE-2011-YeHL #fault #multi #on the #using
On diagnosis of multiple faults using compacted responses (JY, YH, XL), pp. 679–684.
DocEngDocEng-2011-QuKWH #case study #metadata #semantics
Interoperable metadata semantics with meta-metadata: a use case integrating search engines (YQ, AK, AMW, AH), pp. 171–174.
DocEngDocEng-2011-RossiR #representation #topic #using
Building a topic hierarchy using the bag-of-related-words representation (RGR, SOR), pp. 195–204.
DRRDRR-2011-BallS #automation #statistics #tool support #using
Statistical characterization of handwriting characteristics using automated tools (GRB, SNS), pp. 1–10.
DRRDRR-2011-BukhariSB #algorithm #documentation #image #multi #segmentation #using
Improved document image segmentation algorithm using multiresolution morphology (SSB, FS, TMB), pp. 1–10.
DRRDRR-2011-ChenCL #constraints #identification #using
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
DRRDRR-2011-CutterBSB #identification #using
Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
DRRDRR-2011-EynardME #corpus #framework #navigation
A framework to improve digital corpus uses: image-mode navigation (LE, VM, HE), pp. 1–10.
DRRDRR-2011-HamdaniAHMA #optimisation #recognition #using
Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization (MH, HEA, TMH, VM, AMA), pp. 1–10.
DRRDRR-2011-KimLT #automation #identification #using
Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
DRRDRR-2011-KunduHBCFJM #online #recognition #tablet #using
Online medical symbol recognition using a Tablet PC (AK, QH, SB, CC, RF, SJ, SM), pp. 1–10.
DRRDRR-2011-LiuZ #image #mobile #using
Segmenting texts from outdoor images taken by mobile phones using color features (ZL, HZ), pp. 1–10.
DRRDRR-2011-PengSGS #approach #documentation #using
Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
DRRDRR-2011-SaabniE #distance #documentation #using #word
Word spotting for handwritten documents using Chamfer Distance and Dynamic Time Warping (RS, JES), pp. 1–10.
HTHT-2011-Contractor #multi #network #using #web
From disasters to WOW: using web science to understand and enable 21st century multidimensional networks (NSC), pp. 1–2.
HTHT-2011-GoedeMNW #network #social #summary #using
Succinct summaries of narrative events using social networks (BdG, MM, AN, JvW), pp. 299–304.
HTHT-2011-SahW #automation #fuzzy #metadata #mining #using
Automatic mining of cognitive metadata using fuzzy inference (MS, VW), pp. 37–46.
HTHT-2011-SeroussiBZ #modelling #personalisation #predict #rating #using
Personalised rating prediction for new users using latent factor models (YS, FB, IZ), pp. 47–56.
HTHT-2011-SolisA #experience #hypermedia #using #wiki
An experience using a spatial hypertext Wiki (CS, NA), pp. 133–142.
HTHT-2011-TakahashiOYIOT #analysis #using #wiki
Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDARICDAR-2011-AbediF #analysis #documentation #image #locality #string #using
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDARICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition #using
Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
ICDARICDAR-2011-AtanasiuLV #novel #retrieval #using
Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
ICDARICDAR-2011-BaechlerI #analysis #layout #multi #using
Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDARICDAR-2011-BarbozaLP #automation #documentation #summary #using
Using Readers’ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization (RdSB, RDL, VMdSP), pp. 212–216.
ICDARICDAR-2011-BuiVPO #identification #recognition #using #word
Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
ICDARICDAR-2011-BukhariSB #set #using
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters (SSB, FS, TMB), pp. 579–583.
ICDARICDAR-2011-CaoPN11a #identification #markov #modelling #recognition #using
Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
ICDARICDAR-2011-CelikY #2d #graph grammar #probability #recognition #using
Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar (MC, BAY), pp. 161–166.
ICDARICDAR-2011-ColuttoG #difference #performance #recognition #using #word
Efficient Word Recognition Using a Pixel-Based Dissimilarity Measure (SC, BG), pp. 1110–1114.
ICDARICDAR-2011-CoustatyBBL #algorithm #image #ontology #semantic gap #using
Using Ontologies to Reduce the Semantic Gap between Historians and Image Processing Algorithms (MC, AB, KB, GL), pp. 156–160.
ICDARICDAR-2011-CoustatyO #documentation #image #using
Discrimination of Old Document Images Using Their Style (MC, JMO), pp. 389–393.
ICDARICDAR-2011-DuHSS #using
Snap and Translate Using Windows Phone (JD, QH, LS, JS), pp. 809–813.
ICDARICDAR-2011-EmilieBA #constraints #network #physics #recognition #semantics
Use of Semantic and Physical Constraints in Bayesian Networks for Form Recognition (EP, YB, AB), pp. 946–950.
ICDARICDAR-2011-Epshtein #documentation #using
Determining Document Skew Using Inter-line Spaces (BE), pp. 27–31.
ICDARICDAR-2011-GarzSD #analysis #layout #using
Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDARICDAR-2011-HaddadHKA #adaptation #network #online #recognition #using
Improvement of On-line Recognition Systems Using a RBF-Neural Network Based Writer Adaptation Module (LH, TMH, MK, AMA), pp. 284–288.
ICDARICDAR-2011-HamamuraINOS #clustering #concurrent #optimisation #recognition #using #word
Concurrent Optimization of Context Clustering and GMM for Offline Handwritten Word Recognition Using HMM (TH, BI, TN, NO, SS), pp. 523–527.
ICDARICDAR-2011-HassanCG #distance #documentation #edit distance #image #using
Document Image Indexing Using Edit Distance Based Hashing (EH, SC, MG), pp. 1200–1204.
ICDARICDAR-2011-HuangYCL #documentation #keyword #statistics #using
Keyword Spotting in Offline Chinese Handwritten Documents Using a Statistical Model (LH, FY, QHC, CLL), pp. 78–82.
ICDARICDAR-2011-HuZ #online #recognition #using
HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature (LH, RZ), pp. 457–462.
ICDARICDAR-2011-IndermuhleFFB #documentation #keyword #network #online #using
Keyword Spotting in Online Handwritten Documents Containing Text and Non-text Using BLSTM Neural Networks (EI, VF, AF, HB), pp. 73–77.
ICDARICDAR-2011-IwamuraKK #image #multi #recognition #using
Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features (MI, TK, KK), pp. 1409–1413.
ICDARICDAR-2011-JainD #identification #using
Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
ICDARICDAR-2011-JiangDLW #algorithm #markov #novel #segmentation #string #using
A Novel Short Merged Off-line Handwritten Chinese Character String Segmentation Algorithm Using Hidden Markov Model (ZJ, XD, CL, YW), pp. 668–672.
ICDARICDAR-2011-KatoDTIM #recognition #using
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
ICDARICDAR-2011-KimO #documentation #image #segmentation #using
Script-Free Text Line Segmentation Using Interline Space Model for Printed Document Images (MK, ISO), pp. 1354–1358.
ICDARICDAR-2011-KleberDS #estimation #using
Scale Space Binarization Using Edge Information Weighted by a Foreground Estimation (FK, MD, RS), pp. 1180–1184.
ICDARICDAR-2011-KluznerT #using
Page Curling Correction for Scanned Books Using Local Distortion Information (VK, AT), pp. 890–894.
ICDARICDAR-2011-KonyaES #using
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting (IVK, SE, CS), pp. 936–940.
ICDARICDAR-2011-KumarD #image #performance #using
Fast Rule-Line Removal Using Integral Images and Support Vector Machines (JK, DSD), pp. 584–588.
ICDARICDAR-2011-KumarPD #classification #documentation #image #learning #multi #using
Document Image Classification and Labeling Using Multiple Instance Learning (JK, JP, DSD), pp. 1059–1063.
ICDARICDAR-2011-KunwarR #geometry #online #recognition #using
Online Handwriting Recognition of Tamil Script Using Fractal Geometry (RK, AGR), pp. 1389–1393.
ICDARICDAR-2011-LeBS #documentation #image #using
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators (THNL, TDB, CYS), pp. 114–118.
ICDARICDAR-2011-LiuLS #graph #image #retrieval #using
Retrieval of Envelope Images Using Graph Matching (LL, YL, CYS), pp. 99–103.
ICDARICDAR-2011-MandalRP #documentation #random #segmentation #using
Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDARICDAR-2011-MarinaiMS11a #distance #retrieval #using
Using Earth Mover’s Distance in the Bag-of-Visual-Words Model for Mathematical Symbol Retrieval (SM, BM, GS), pp. 1309–1313.
ICDARICDAR-2011-NeumannM #image #locality #using
Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search (LN, JM), pp. 687–691.
ICDARICDAR-2011-PanZSN #invariant #using
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
ICDARICDAR-2011-PengCPN #random #using #video
Text Extraction from Video Using Conditional Random Fields (XP, HC, RP, PN), pp. 1029–1033.
ICDARICDAR-2011-PinsonB #component #using
Connected Component Level Discrimination of Handwritten and Machine-Printed Text Using Eigenfaces (SJP, WAB), pp. 1394–1398.
ICDARICDAR-2011-RahnemoonfarA #documentation #image #using
Restoration of Arbitrarily Warped Historical Document Images Using Flow Lines (MR, AA), pp. 905–909.
ICDARICDAR-2011-RoyRR #documentation #retrieval #using #word
Word Retrieval in Historical Document Using Character-Primitives (PPR, JYR, NR), pp. 678–682.
ICDARICDAR-2011-SaabniE #independence #using
Language-Independent Text Lines Extraction Using Seam Carving (RS, JES), pp. 563–568.
ICDARICDAR-2011-SaldarriagaC #network #online #using #word
Indexing On-line Handwritten Texts Using Word Confusion Networks (SPS, MC), pp. 197–201.
ICDARICDAR-2011-SituLT #image #locality #probability #using #web
Text Localization in Web Images Using Probabilistic Candidate Selection Model (LS, RL, CLT), pp. 1359–1363.
ICDARICDAR-2011-SunK #retrieval #using #visual notation
Similar Manga Retrieval Using Visual Vocabulary Based on Regions of Interest (WS, KK), pp. 1075–1079.
ICDARICDAR-2011-TaoLJG #learning #locality #recognition #using
Similar Handwritten Chinese Character Recognition Using Discriminative Locality Alignment Manifold Learning (DT, LL, LJ, YG), pp. 1012–1016.
ICDARICDAR-2011-VincentNP #algorithm #documentation #using
Document Recto-verso Registration Using a Dynamic Time Warping Algorithm (VR, NJ, JPD), pp. 1230–1234.
ICDARICDAR-2011-WakaharaK #clustering #image #string #using
Binarization of Color Character Strings in Scene Images Using K-Means Clustering and Support Vector Machines (TW, KK), pp. 274–278.
ICDARICDAR-2011-WangWZ #graph #online #using #verification
On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
ICDARICDAR-2011-XiaWL #clustering #keyword #knowledge-based #using
Chinese Keyword Spotting Using Knowledge-Based Clustering (YX, KW, ML), pp. 789–793.
ICDARICDAR-2011-XuYWL #analysis #using
Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
ICDARICDAR-2011-YouADGT #detection #using
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDARICDAR-2011-ZanibbiY #documentation #image #query #using
Math Spotting: Retrieving Math in Technical Documents Using Handwritten Query Images (RZ, LY), pp. 446–451.
ICDARICDAR-2011-ZhangLYDW #random #recognition #using
An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDARICDAR-2011-ZhouYWWNL #random #using
Transcript Mapping for Handwritten Text Lines Using Conditional Random Fields (XDZ, FY, DHW, QFW, MN, CLL), pp. 58–62.
ICDARICDAR-2011-ZhuN #online #optimisation #parametricity #recognition #using
On-line Handwritten Japanese Characters Recognition Using a MRF Model with Parameter Optimization by CRF (BZ, MN), pp. 603–607.
ICDARICDAR-2011-ZhuN11b #online #recognition #using
Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
PODSPODS-2011-CohenK #using
Get the most out of your sample: optimal unbiased estimators using partial information (EC, HK), pp. 13–24.
SIGMODSIGMOD-2011-ArasuKL #constraints #declarative #generative #using
Data generation using declarative constraints (AA, RK, JL), pp. 685–696.
SIGMODSIGMOD-2011-DoZPDNH #using
Turbocharging DBMS buffer pool using SSDs (JD, DZ, JMP, DJD, JFN, AH), pp. 1113–1124.
SIGMODSIGMOD-2011-KohlerYZ #parallel #performance #using
Efficient parallel skyline processing using hyperplane projections (HK, JY, XZ), pp. 85–96.
SIGMODSIGMOD-2011-LiMDMS #framework #pipes and filters #scalability #using
A platform for scalable one-pass analytics using MapReduce (BL, EM, YD, AM, PJS), pp. 985–996.
SIGMODSIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence #using
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMODSIGMOD-2011-OkcanR #pipes and filters #using
Processing theta-joins using MapReduce (AO, MR), pp. 949–960.
VLDBVLDB-2011-AliCFWDR #online #using #visualisation
Online Visualization of Geospatial Stream Data using the WorldWide Telescope (MHA, BC, JF, CW, SMD, BSR), pp. 1379–1382.
VLDBVLDB-2011-AoZWSWLLL #algorithm #parallel #performance #using
Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units (NA, FZ, DW, DSS, GW, XL, JL, SL), pp. 470–481.
VLDBVLDB-2011-ArasuKL #constraints #declarative #generative #named #using
DataSynth: Generating Synthetic Data using Declarative Constraints (AA, RK, JL), pp. 1418–1421.
VLDBVLDB-2011-DasNAA #database #lightweight #migration #named #using
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration (SD, SN, DA, AEA), pp. 494–505.
VLDBVLDB-2011-KimRA #algebra #pipes and filters #using
From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra (HK, PR, KA), pp. 1426–1429.
VLDBVLDB-2011-KocR #classification #incremental #maintenance #using
Incrementally maintaining classification using an RDBMS (MLK, CR), pp. 302–313.
VLDBVLDB-2011-LeeNS #estimation #locality #similarity #using
Similarity Join Size Estimation using Locality Sensitive Hashing (HL, RTN, KS), pp. 338–349.
VLDBVLDB-2011-NiuRDS #logic #markov #named #network #scalability #statistics #using
Tuffy: Scaling up Statistical Inference in Markov Logic Networks using an RDBMS (FN, CR, AD, JWS), pp. 373–384.
VLDBVLDB-2011-RaoST #consistency #scalability #using
Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore (JR, EJS, ST), pp. 243–254.
VLDBVLDB-2012-KruegerKGSSCPDZ11 #database #manycore #performance #using
Fast Updates on Read-Optimized Databases Using Multi-Core CPUs (JK, CK, MG, NS, DS, JC, HP, PD, AZ), pp. 61–72.
VLDBVLDB-2012-KumarR11 #probability #using
Probabilistic Management of OCR Data using an RDBMS (AK, CR), pp. 322–333.
VLDBVLDB-2012-RuttenbergS11 #distance #using
Indexing the Earth Mover’s Distance Using Normal Distributions (BER, AKS), pp. 205–216.
CSEETCSEET-2011-BollinHM #education #project management #simulation #using
Teaching software project management using simulations (AB, EH, RTM), pp. 81–90.
CSEETCSEET-2011-KnudsonR #agile #industrial
Updating CS capstone projects to incorporate new agile methodologies used in industry (DK, AR), pp. 444–448.
CSEETCSEET-2011-LethbridgeMFB #education #programming #uml #using
Teaching UML using umple: Applying model-oriented programming in the classroom (TCL, GM, AF, OBB), pp. 421–428.
CSEETCSEET-2011-LongstreetC #education #game studies #re-engineering #student #using
Using games in software engineering education to increase student success and retention (CSL, KMLC), p. 554.
CSEETCSEET-2011-LuLL #analysis #using
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-OffuttLAX #abstraction #design #education #using #web
Using abstraction and Web applications to teach criteria-based test design (JO, NL, PA, WX), pp. 227–236.
CSEETCSEET-2011-RadermacherW #empirical #interactive #programming #student #using
Investigating student-instructor interactions when using pair programming: An empirical study (AR, GSW), pp. 41–50.
CSEETCSEET-2011-RoshandelGL #education #re-engineering #using
Using community-based projects in software engineering education (RR, JG, RL), pp. 472–476.
CSEETCSEET-2011-Scharff #agile #assurance #development #quality #using
Guiding global software development projects using Scrum and Agile with quality assurance (CS), pp. 274–283.
ITiCSEITiCSE-2011-BackCMM #case study #modelling #student #using
A study in engaging female students in computer science using role models (JB, PC, CM, PWM), pp. 63–67.
ITiCSEITiCSE-2011-GuimaraesSA #education #game studies #security #using #video
Using video games to teach security (MAMG, HES, RA), p. 346.
ITiCSEITiCSE-2011-Harms #api #implementation #java #using
A Java implementation of the myro API for using personal robots in CS1 (DEH), p. 338.
ITiCSEITiCSE-2011-HarrachA #collaboration #learning #optimisation #process #recommendation #using
Optimizing collaborative learning processes by using recommendation systems (SH, MA), p. 389.
ITiCSEITiCSE-2011-HoverHRM #collaboration #how #learning #student
Evaluating how students would use a collaborative linked learning space (KMH, MH, GR, MM), pp. 88–92.
ITiCSEITiCSE-2011-KleinKT #analysis #assessment #automation #semantics #using
Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ITiCSEITiCSE-2011-LangeFL
An update on the use of community-based non-profit organizations in capstone projects (DKL, RCF, PML), p. 372.
ITiCSEITiCSE-2011-Law #development #documentation #student #using
Using student blogs for documentation in software development projects (RL), p. 366.
ITiCSEITiCSE-2011-MarkhamB #bound #twitter #using
Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ITiCSEITiCSE-2011-MesserK #problem #process
The use of mediating artifacts in embedding problem solving processes in an e-learning environment (OMM, AK), p. 390.
ITiCSEITiCSE-2011-RodgerQS
Changes to JFLAP to increase its use in courses (SHR, HQ, JS), p. 339.
ITiCSEITiCSE-2011-StrieweG11a #automation #programming #runtime #using
Using run time traces in automated programming tutoring (MS, MG), pp. 303–307.
ITiCSEITiCSE-2011-VilnerZT #education #inheritance #using
Using greenfoot in teaching inheritance in CS1 (TV, EZ, ST), p. 342.
ITiCSEITiCSE-2011-WittmannBK #programming #using
Using the SCORE software package to analyse novice computer graphics programming (MRAW, MB, MKT), pp. 118–122.
ESOPESOP-2011-GuhaSK #analysis #type system #using
Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
FASEFASE-2011-EhrigET #graph #using #version control
A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
FASEFASE-2011-KelsenMG #complexity #modelling #using
Models within Models: Taming Model Complexity Using the Sub-model Lattice (PK, QM, CG), pp. 171–185.
FASEFASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #using #visual notation
On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
TACASTACAS-2011-GarbervetskyGN #invariant #using
Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
TACASTACAS-2011-GopinathMK #program repair #satisfiability #using
Specification-Based Program Repair Using SAT (DG, MZM, SK), pp. 173–188.
TACASTACAS-2011-TalupurH #model checking #using
Biased Model Checking Using Flows (MT, HH), pp. 239–253.
SCAMSCAM-J-2009-PhalpAJVK11 #case study #comprehension #requirements
The role of comprehension in requirements and implications for use case descriptions (KP, AA, SJ, JV, JMK), pp. 461–486.
CSMRCSMR-2011-CorazzaMMS #clustering
Investigating the Use of Lexical Information for Software System Clustering (AC, SDM, VM, GS), pp. 35–44.
CSMRCSMR-2011-CoutoVF #case study #compilation #product line #using
Extracting Software Product Lines: A Case Study Using Conditional Compilation (MVC, MTV, EF), pp. 191–200.
CSMRCSMR-2011-KohlKPDM #analysis #maintenance #multi #using
Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
CSMRCSMR-2011-SilvaPAM #execution #on the
On the Use of Execution Trace Alignment for Driving Perfective Changes (LLS, KRP, SdA, MdAM), pp. 221–230.
ICPCICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity #using
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-HouL #api #case study #framework #using
Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers’ Newsgroup Discussions (DH, LL), pp. 91–100.
ICPCICPC-2011-LuciaPOPP #traceability #using
Improving IR-based Traceability Recovery Using Smoothing Filters (ADL, MDP, RO, AP, SP), pp. 21–30.
ICPCICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code #using
Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICSMEICSM-2011-Briand #re-engineering #research
Useful software engineering research — leading a double-agent life (LCB), p. 2.
ICSMEICSM-2011-DraganCHM #commit #using
Using stereotypes to help characterize commits (ND, MLC, MH, JIM), pp. 520–523.
ICSMEICSM-2011-KhomhCZSD #fault #predict #testing #using
Predicting post-release defects using pre-release field testing results (FK, BC, YZ, AS, DD), pp. 253–262.
ICSMEICSM-2011-KuDYW #case study #industrial #maintenance
Estimating software maintenance effort from use cases: An industrial case study (YK, JD, YY, QW), pp. 482–491.
ICSMEICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability #using
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
ICSMEICSM-2011-PaymalPBS #evolution #graph #metric #process #using
Measuring disruption from software evolution activities using graph-based metrics (PP, RP, SB, HPS), pp. 532–535.
ICSMEICSM-2011-QusefBOLB #concept #named #slicing #traceability #using
SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSMEICSM-2011-RomanoP #interface #java #metric #predict #source code #using
Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSMEICSM-2011-ShternT #clustering #multi #using
Evaluating software clustering using multiple simulated authoritative decompositions (MS, VT), pp. 353–361.
MSRMSR-2011-BinkleyHL #identifier #speech #using
Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
MSRMSR-2011-CallauRTR #developer #how #programming language #smalltalk
How developers use the dynamic features of programming languages: the case of smalltalk (OC, RR, ÉT, DR), pp. 23–32.
MSRMSR-2011-LiZ #re-engineering #semantics #using #web
Integrating software engineering data using semantic web technologies (YFL, HZ), pp. 211–214.
WCREWCRE-2011-AryaniPLMN #dependence #predict #question #using
Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
WCREWCRE-2011-Beard #debugging #information retrieval #locality #using
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code #using
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCREWCRE-2011-MyersS #execution #using
Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
WCREWCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality #using
Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
WCREWCRE-2011-ZibranER #api #usability
Useful, But Usable? Factors Affecting the Usability of APIs (MFZ, FZE, CKR), pp. 151–155.
PEPMPEPM-2011-AlbertBGHPR #using
Verified resource guarantees using COSTA and KeY (EA, RB, SG, RH, GP, GRD), pp. 73–76.
PLDIPLDI-2011-AltidorHS
Taming the wildcards: combining definition- and use-site variance (JA, SSH, YS), pp. 602–613.
PLDIPLDI-2011-BohmKKFT #compilation #parallel #using
Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator (IB, TJKEvK, SCK, BF, NPT), pp. 74–85.
PLDIPLDI-2011-JoseM #fault #locality #satisfiability #using
Cause clue clauses: error localization using maximum satisfiability (MJ, RM), pp. 437–446.
PLDIPLDI-2011-LuciaWC #comprehension #concurrent #execution #fault #using
Isolating and understanding concurrency errors using reconstructed execution fragments (BL, BPW, LC), pp. 378–388.
PLDIPLDI-2011-RamanKOLA #distributed #parallel #using
Parallelism orchestration using DoPE: the degree of parallelism executive (AR, HK, TO, JWL, DIA), pp. 26–37.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
PLDIPLDI-2011-ZengWL #concurrent #data type #monitoring #named #using
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures (QZ, DW, PL), pp. 367–377.
SASSAS-2011-DonaldsonHKR #using #verification
Software Verification Using k-Induction (AFD, LH, DK, PR), pp. 351–368.
SASSAS-2011-MadhusudanQ #performance #using
Efficient Decision Procedures for Heaps Using STRAND (PM, XQ), pp. 43–59.
SASSAS-2011-MonniauxG #bound #fixpoint #model checking #using
Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
STOCSTOC-2011-Goyal #constant #protocol #using
Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
CIAACIAA-J-2010-YuBI11 #automaton #multi #relational #string #using #verification
Relational String Verification Using Multi-Track Automata (FY, TB, OHI), pp. 1909–1924.
CIAACIAA-2011-CarninoF #automaton #generative #markov #random #using
Random Generation of Deterministic Acyclic Automata Using Markov Chains (VC, SDF), pp. 65–75.
DLTDLT-2011-KuncO #automaton #finite #using
Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
ICALPICALP-v2-2011-Husfeldt #algorithm
Invitation to Algorithmic Uses of Inclusion-Exclusion (TH), pp. 42–59.
LATALATA-2011-Colcombet #automaton
Green’s Relations and Their Use in Automata Theory (TC), pp. 1–21.
LATALATA-2011-LabathR #information management #using
Simplifying DPDA Using Supplementary Information (PL, BR), pp. 342–353.
IFMIFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification #using
A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
FMFM-2011-BartheCK #relational #source code #using #verification
Relational Verification Using Product Programs (GB, JMC, CK), pp. 200–214.
FMFM-2011-MullerR #using #verification
Using Debuggers to Understand Failed Verification Attempts (PM, JNR), pp. 73–87.
SEFMSEFM-2011-JacquelBDD #automation #proving #theorem proving #using #verification
Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving (MJ, KB, DD, CD), pp. 253–268.
SEFMSEFM-2011-OnoHTNH #coq #pipes and filters #specification #using
Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications (KO, YH, YT, NN, MH), pp. 350–365.
SEFMSEFM-2011-Sanchez #using
Using System Dynamics to Assess the Role of Socio-economic Status in Tuberculosis Incidence (MAS), pp. 464–475.
ICFPICFP-2011-ChyzakD #generative #ml #runtime #using #web
Using camlp4 for presenting dynamic mathematics on the web: DynaMoW, an OCaml language extension for the run-time generation of mathematical contents and their presentation on the web (FC, AD), pp. 259–265.
IFLIFL-2011-Thomsen #functional #logic #optimisation #using
Describing and Optimising Reversible Logic Using a Functional Language (MKT), pp. 148–163.
CHICHI-2011-BurkeKM #facebook #social
Social capital on facebook: differentiating uses and users (MB, RK, CM), pp. 571–580.
CHICHI-2011-CervantesWNS #low cost
Infrastructures for low-cost laptop use in Mexican schools (RC, MW, BAN, NS), pp. 945–954.
CHICHI-2011-ChangL #framework #migration #mobile #using
Deep shot: a framework for migrating tasks across devices using mobile phone cameras (THC, YL), pp. 2163–2172.
CHICHI-2011-ChenNHD #interactive
Unpacking exam-room computing: negotiating computer-use in patient-physician interactions (YC, VN, SH, VD), pp. 3343–3352.
CHICHI-2011-ChiZXYW #authoring #collaboration #coordination #email #using
Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHICHI-2011-CohnMPT #gesture #using
Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
CHICHI-2011-CowanL #interactive #mobile #named #using
ShadowPuppets: supporting collocated interaction with mobile projector phones using hand shadows (LGC, KAL), pp. 2707–2716.
CHICHI-2011-CramerHTYH #interactive #student #visual notation
Classroom-based assistive technology: collective use of interactive visual schedules by students with autism (MC, SHH, MT, MTY, GRH), pp. 1–10.
CHICHI-2011-EllingLJ #eye tracking #using
Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHICHI-2011-EppLM #identification #using
Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHICHI-2011-Freeman #eye tracking #protocol #usability #using
Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CHICHI-2011-HarrisonHWFH #design #named #user interface #using #visual notation
Kineticons: using iconographic motion in graphical user interface design (CH, GH, KDDW, JF, SEH), pp. 1999–2008.
CHICHI-2011-HuangWD #problem #using
No clicks, no problem: using cursor movements to understand and improve search (JH, RWW, STD), pp. 1225–1234.
CHICHI-2011-HuhNA #collaboration
Supporting collaborative help for individualized use (JH, MWN, MSA), pp. 3141–3150.
CHICHI-2011-HutamaSFG #correlation #interactive #multi #using
Distinguishing multiple smart-phone interactions on a multi-touch wall display using tilt correlation (WH, PS, CWF, WBG), pp. 3315–3318.
CHICHI-2011-John #design #modelling #performance #predict #recommendation #user interface #using
Using predictive human performance models to inspire and support UI design recommendations (BEJ), pp. 983–986.
CHICHI-2011-JunuzovicIHZTB #bibliography #multimodal #using #what
What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing (SJ, KI, RH, ZZ, JCT, CB), pp. 513–522.
CHICHI-2011-KhotSK #authentication #named #novel #using
MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
CHICHI-2011-KimRZPH #usability
Creek watch: pairing usefulness and usability for successful citizen science (SK, CR, TZ, JSP, EMH), pp. 2125–2134.
CHICHI-2011-KimS #community #health #interface #online #using
Using interface cues in online health community boards to change impressions and encourage user contribution (HSK, SSS), pp. 599–608.
CHICHI-2011-KuhnCQS #using
Using tags to encourage reflection and annotation on data during nomadic inquiry (AK, CC, CQ, SS), pp. 667–670.
CHICHI-2011-LaheyGBV #comprehension #flexibility #gesture #mobile #named
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays (BL, AG, WB, RV), pp. 1303–1312.
CHICHI-2011-LeeD #functional
Reflecting on pills and phone use: supporting awareness of functional abilities for older adults (MLL, AKD), pp. 2095–2104.
CHICHI-2011-LeeT #mobile #quote #social
“Now, I have a body”: uses and social norms for mobile remote presence in the workplace (MKL, LT), pp. 33–42.
CHICHI-2011-LelisH #how #online #people #rating
Informing decisions: how people use online rating information to make choices (SL, AH), pp. 2285–2294.
CHICHI-2011-Light #design #performance #using
Democratising technology: making transformation using designing, performance and props (AL), pp. 2239–2242.
CHICHI-2011-LindqvistCWHZ #people #why
I’m the mayor of my house: examining why people use foursquare — a social-driven location sharing application (JL, JC, JW, JIH, JZ), pp. 2409–2418.
CHICHI-2011-LucaFMSHKH #internet #security #visualisation
Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool (ADL, BF, MEM, JS, DH, NK, HH), pp. 887–890.
CHICHI-2011-LuceroHJ #collaboration #mobile #named
Pass-them-around: collaborative use of mobile phones for photo sharing (AL, JH, TJ), pp. 1787–1796.
CHICHI-2011-LuL #gesture #mobile #user interface #using
Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
CHICHI-2011-MandrykL
The effects of intended use on target acquisition (RLM, CL), pp. 1649–1652.
CHICHI-2011-MarshallB #case study #experience #interactive #performance #using
Using fast interaction to create intense experiences (JM, SB), pp. 1255–1264.
CHICHI-2011-MarshallMRKD #approach #how #interface #multi
Rethinking “multi-user”: an in-the-wild study of how groups approach a walk-up-and-use tabletop interface (PM, RM, YR, SK, MD), pp. 3033–3042.
CHICHI-2011-MarshallS #social #social media #twitter #using
Social media ownership: using twitter as a window onto current attitudes and beliefs (CCM, FMSI), pp. 1081–1090.
CHICHI-2011-MatthewsD #mobile #using
In the mood: engaging teenagers in psychotherapy using mobile phones (MM, GD), pp. 2947–2956.
CHICHI-2011-NackeKLM #design #game studies #interactive #using
Biofeedback game design: using direct and indirect physiological control to enhance game interaction (LEN, MK, CL, RLM), pp. 103–112.
CHICHI-2011-NiKW #communication #named #using
AnatOnMe: facilitating doctor-patient communication using a projection-based handheld device (TN, AKK, DW), pp. 3333–3342.
CHICHI-2011-PazminoL #case study #mobile
An exploratory study of input modalities for mobile devices used with museum exhibits (PJP, LL), pp. 895–904.
CHICHI-2011-ShinoharaW #interactive #social
In the shadow of misperception: assistive technology use and social interactions (KS, JOW), pp. 705–714.
CHICHI-2011-SporkaFKPHM #named #predict #using
CHANTI: predictive text entry using non-verbal vocal input (AJS, TF, SHK, OP, PH, ISM), pp. 2463–2472.
CHICHI-2011-TamakiMR #named #using
PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
CHICHI-2011-WeilenmannJ #comprehension #interactive #people
Understanding people and animals: the use of a positioning system in ordinary human-canine interaction (AW, OJ), pp. 2631–2640.
CHICHI-2011-WobbrockFGH #analysis #parametricity #rank #using
The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
CHICHI-2011-YangGIF #proximity #using
TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing (XDY, TG, PI, GWF), pp. 2585–2594.
CHICHI-2011-YardiB #challenge #social #social media
Social and technical challenges in parenting teens’ social media use (SY, AB), pp. 3237–3246.
CHICHI-2011-YataniNTT #bibliography #user interface #using #word
Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs (KY, MN, AT, KNT), pp. 1541–1550.
CHICHI-2011-ZhaoCB #multi #named #navigation #using #visual notation
KronoMiner: using multi-foci navigation for the visual exploration of time-series data (JZ, FC, RB), pp. 1737–1746.
CSCWCSCW-2011-Chen #health
Health information use in chronic care cycles (YC), pp. 485–488.
CSCWCSCW-2011-FanLZTSW #game studies #gesture #social #using
Surprise Grabber: a co-located tangible social game using phone hand gesture (MF, XL, YZ, LT, YS, HW), pp. 625–628.
CSCWCSCW-2011-GergleC #collaboration #eye tracking #mobile #using #what
See what I’m saying?: using Dyadic Mobile Eye tracking to study collaborative reference (DG, ATC), pp. 435–444.
CSCWCSCW-2011-GuibourdencheVGFH #distributed #multi #process #product line #using
Using multiple scores for transcribing the distributed activities of a family (JG, JVR, MG, MF, YH), pp. 637–640.
CSCWCSCW-2011-JiangGH #3d #case study #video
The video of Xland: two core use cases of 3D blog (YJ, RG, YH), pp. 583–584.
CSCWCSCW-2011-KamranC #collaboration #ontology #social #social media #using
Defining ontology by using users collaboration on social media (SK, FC), pp. 657–660.
CSCWCSCW-2011-MarshallRP #interactive #physics #using
Using F-formations to analyse spatial patterns of interaction in physical environments (PM, YR, NP), pp. 445–454.
CSCWCSCW-2011-MistryNM11a #named #using
SPARSH: passing data using the body as a medium (PM, SN, PM), pp. 689–692.
CSCWCSCW-2011-NewmanLMRM #challenge #facebook #health #network #online #problem #social #using
It’s not that I don’t have problems, I’m just not putting them on facebook: challenges and opportunities in using online social networks for health (MWN, DL, SAM, PR, MEM), pp. 341–350.
CSCWCSCW-2011-ReynoldsGMMVWBH #student
Contact stratification and deception: blackberry messenger versus SMS use among students (LR, SG, JM, ZM, PV, AW, JPB, JTH), pp. 221–224.
HCIDHM-2011-DongWYF #evaluation #research #simulation
Research on Digital Human Model Used in Human Factor Simulation and Evaluation of Load Carriage Equipment (DD, LW, XY, SF), pp. 255–262.
HCIDHM-2011-EilersM #composition #learning #modelling #using
Learning the Relevant Percepts of Modular Hierarchical Bayesian Driver Models Using a Bayesian Information Criterion (ME, CM), pp. 463–472.
HCIDHM-2011-OdenthalMKKS #empirical #using
An Empirical Study of Disassembling Using an Augmented Vision System (BO, MPM, WK, BK, CMS), pp. 399–408.
HCIDHM-2011-QinTD #type system #using
The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
HCIDHM-2011-WuHYNH #parametricity #using
Using Physiological Parameters to Evaluate Operator’s Workload in Manual Controlled Rendezvous and Docking (RVD) (BW, FH, ZY, JN, WH), pp. 426–435.
HCIDUXU-v1-2011-AnderssonBORT #industrial
To Develop Viable Human Factors Engineering Methods for Improved Industrial Use (JA, LOB, ALO, MJR, ST), pp. 355–362.
HCIDUXU-v1-2011-BjorndalRM #industrial #lessons learnt #requirements #specification #using
Lessons Learned from Using Personas and Scenarios for Requirements Specification of Next-Generation Industrial Robots (PB, MJR, SM), pp. 378–387.
HCIDUXU-v1-2011-BotellaGT #evaluation #heuristic #interactive #using
Using Interaction Patterns in Heuristic Evaluation (FB, JAG, RT), pp. 23–32.
HCIDUXU-v1-2011-KashiwaseKKFYJ #mobile
Comparisons on Kansei Factors of Attractiveness between Initial and Long Term Use of Mobile Phone (NK, KK, HK, SF, MY, HJ), pp. 593–601.
HCIDUXU-v1-2011-KimPHPJPLH
A Guideline for an Outpatient Guidance System for Use in General Hospitals (GK, JP, MH, HP, DJ, SHP, SL, SH), pp. 261–269.
HCIDUXU-v1-2011-OhgiS #case study #enterprise #standard #using
ISO Standards and Enterprise Software: A Case Study Using SUMI and SUS in an International Sale (JO, JS), pp. 178–184.
HCIDUXU-v1-2011-RitterE #segmentation #using
An Extensible Tool for the Annotation of Videos Using Segmentation and Tracking (MR, ME), pp. 295–304.
HCIDUXU-v1-2011-TurnerC #interface #question
Phone Use and Aging: Do Spatial Interface Metaphors Help? (MT, RC), pp. 678–686.
HCIDUXU-v1-2011-YamagishiJKKF #mobile
Proposal for Indices to Assess Attractiveness on Initial Use of Mobile Phones (MY, HJ, KK, HK, SF), pp. 696–705.
HCIDUXU-v1-2011-YeratziotisSVN #analysis
Analysis of Emergent Use for Wellbeing Service Innovation (AY, CS, JV, MN), pp. 332–341.
HCIDUXU-v2-2011-ChaeKN #experience #using
Measuring Drivers’ Dynamic Seating Experience Using Pressure Mats (SC, GK, KN), pp. 368–375.
HCIDUXU-v2-2011-ChenL11a #2d #3d #design #evaluation #interface #using
Design and Evaluation of the Customized Product Color Combination Interfaces Using 3D Model and 2D Illustration Display (CYC, YJL), pp. 269–275.
HCIDUXU-v2-2011-KhashmanL #using
Measuring Cultural Markers in Arabic Government Websites Using Hofstede’s Cultural Dimensions (NK, AL), pp. 431–439.
HCIDUXU-v2-2011-MasakiOUM #evaluation #experience
A Quantitative Evaluation on the Software Use Experience with Electroencephalogram (HM, MO, HU, KiM), pp. 469–477.
HCIDUXU-v2-2011-PohlmeyerB #analysis
A Conjoint Analysis of Attributes Affecting the Likelihood of Technology Use (AEP, LTMB), pp. 303–312.
HCIDUXU-v2-2011-RubegniML #interactive #scalability #social #using
Talking to Strangers: Using Large Public Displays to Facilitate Social Interaction (ER, NM, ML), pp. 195–204.
HCIDUXU-v2-2011-ShenPC #using
A Solution to Revisitation Using Organic Bookmark Management (STS, SDP, KMC), pp. 46–52.
HCIDUXU-v2-2011-TsaoCY #case study #design #image
A Study on the Expected Image and Relevant Design Techniques in Different Product-Use Stages (YCT, BC, YPY), pp. 655–663.
HCIHCD-2011-BurkhardtNBSK #named #semantics #using
SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor (DB, KN, MB, CS, AK), pp. 491–499.
HCIHCD-2011-Lin #communication #design #research #semantics
Research in the Use of Product Semantics to Communicate Product Design Information (CHL), pp. 556–565.
HCIHCI-DDA-2011-DittmarF #implementation #interactive #modelling #using
Intertwined Modeling and Implementation of Interactive Systems Using HOPS (AD, PF), pp. 194–203.
HCIHCI-DDA-2011-EngelMF #human-computer #interactive #user interface
HCI Patterns as a Means to Transform Interactive User Interfaces to Diverse Contexts of Use (JE, CM, PF), pp. 204–213.
HCIHCI-DDA-2011-HessMT #interactive #using
Differentiating between Successful and Less Successful Products by Using MAInEEAC — A Model for Interaction Characterization (SH, AM, MT), pp. 238–247.
HCIHCI-DDA-2011-IglesiasT #component #representation #user interface #using
User Interface Representation Using Simple Components (JRI, PMTF), pp. 278–287.
HCIHCI-DDA-2011-KimJRWS #behaviour #simulation #using
Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
HCIHCI-DDA-2011-KogaT #recommendation #topic #twitter #using
Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics (HK, TT), pp. 461–470.
HCIHCI-DDA-2011-LuoY #algorithm #clustering #framework #network #novel #parallel #using
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework (RL, QY), pp. 598–607.
HCIHCI-DDA-2011-ShiraiT #composition #interactive #music #using
A Proposal of an Interactive Music Composition System Using Gibbs Sampler (AS, TT), pp. 490–497.
HCIHCI-ITE-2011-AbushamB #graph #recognition #using
Face Recognition Using Local Graph Structure (LGS) (EEAA, HKB), pp. 169–175.
HCIHCI-ITE-2011-AngeliniCCKM #gesture #interactive #multi #scalability #using
Multi-user Pointing and Gesture Interaction for Large Screen Using Infrared Emitters and Accelerometers (LA, MC, SC, OAK, EM), pp. 185–193.
HCIHCI-ITE-2011-ChoiHK #3d #estimation #gesture #interface #using
3D-Position Estimation for Hand Gesture Interface Using a Single Camera (SHC, JHH, JHK), pp. 231–237.
HCIHCI-ITE-2011-FahnC #gesture #interactive #recognition
Hidden-Markov-Model-Based Hand Gesture Recognition Techniques Used for a Human-Robot Interaction System (CSF, KYC), pp. 248–258.
HCIHCI-ITE-2011-JayaramanB #interface #using
Uni-model Human System Interface Using sEMG (SJ, VB), pp. 446–453.
HCIHCI-ITE-2011-KimiokaST #multi #using
Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCIHCI-ITE-2011-LeeOL #recognition #using
Facial Expression Recognition Using AAMICPF (JSL, CMO, CWL), pp. 268–274.
HCIHCI-ITE-2011-MorieCB #case study #using
Report on a Preliminary Study Using Breath Control and a Virtual Jogging Scenario as Biofeedback for Resilience Training (JFM, EC, JGB), pp. 474–480.
HCIHCI-ITE-2011-NakaI #3d #communication #gesture #interface #using
Web-Based Nonverbal Communication Interface Using 3DAgents with Natural Gestures (TN, TI), pp. 565–574.
HCIHCI-ITE-2011-NebeKJF #interactive #multi #using
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCIHCI-ITE-2011-NebeMK #multi #requirements #using
An Investigation on Requirements for Co-located Group-Work Using Multitouch-, Pen-Based- and Tangible-Interaction (KN, TM, FK), pp. 90–99.
HCIHCI-ITE-2011-OkamotoYW #using #visual notation
A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCIHCI-MIIE-2011-ForutanpourR #collaboration #mobile #named #using
ProJest: Enabling Higher Levels of Collaboration Using Today’s Mobile Devices (BF, JR), pp. 48–58.
HCIHCI-MIIE-2011-GaoG #mobile #representation
The Effect of Time Orientation and Representation of Points of Interests on the Use of Mobile Tour Guide (FG, QG), pp. 59–68.
HCIHCI-MIIE-2011-KimHJHMJ #analysis #behaviour #using #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-MIIE-2011-KolskiUROD #evaluation #interactive
Interaction in Mobility: The Evaluation of Interactive Systems Used by Travellers in Transportation Contexts (CK, GU, JMR, KMdO, BD), pp. 301–310.
HCIHCI-MIIE-2011-MinKH #recognition #using
Spectral Subtraction Based Emotion Recognition Using EEG (JHM, HOK, KSH), pp. 569–576.
HCIHCI-MIIE-2011-PlocherJC #using
Using Sound Patterns to Enhance Directional Sound for Emergency Route Guidance (TP, ZJJ, FYDC), pp. 329–337.
HCIHCI-MIIE-2011-RattanyuM #biology #recognition #using
Emotion Recognition Using Biological Signal in Intelligent Space (KR, MM), pp. 586–592.
HCIHCI-UA-2011-BellegoBBT #smarttech #using
Using a Smart Phone for Information Rendering in Computer-Aided Surgery (GLB, MB, IB, JT), pp. 202–209.
HCIHCI-UA-2011-HymelLBSB #concept #interactive
The Interaction of Children’s Concepts about Agents and Their Ability to Use an Agent-Based Tutoring System (AMH, DTL, JB, MMS, GB), pp. 580–589.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity #using
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHCI-UA-2011-KimCD #health #using
Using Pen-Based Computing in Technology for Health (HK, YSC, EYLD), pp. 192–201.
HCIHCI-UA-2011-LargeB #comparison #interface #retrieval #using #visualisation
A Comparison of Children’s and Adults’ Retrieval Performances and Affective Reactions When Using a Conventional Interface and an Information Visualization Interface (AL, JB), pp. 590–598.
HCIHCI-UA-2011-Levis #communication #towards #using #women
Working toward Women’s Economic Empowerment: Using Information and Communication Technology in Developing Areas to Market Traditional Crafts (MSL), pp. 266–273.
HCIHCI-UA-2011-LinHLYH #mining #using
Using Grounded Theory and Text Mining to Find Interesting Reading Materials for Slow EFL Learners (YCL, ClH, MHL, HFY, CFH), pp. 77–85.
HCIHCI-UA-2011-MaehigashiMTKMH #automation #using
Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
HCIHCI-UA-2011-Nesset #evaluation #visual notation
Following the Signs: Children’s Use of Visual Cues to Facilitate Website Evaluation (VN), pp. 599–606.
HCIHCI-UA-2011-OhkuraKKTESIW #using
Restoration Support System for a Historic Textile Market Using Virtual Environment (MO, MK, YK, ST, HE, AS, TI, YW), pp. 413–422.
HCIHCI-UA-2011-Wang11a #interactive #learning #network #student #tool support #using
Interactions between Human and Computer Networks: EFL College Students Using Computer Learning Tools in Remedial English Classes (ALW), pp. 107–112.
HCIHIMI-v1-2011-KinoshitaTN #using #visualisation
Kansei Stroll Map: Walking around a City Using Visualized Impressions of Streetscapes (YK, ST, TN), pp. 211–220.
HCIHIMI-v1-2011-KomatsuO #case study #evaluation #using #visual notation
Study on Evaluation of Kawaii Colors Using Visual Analog Scale (TK, MO), pp. 103–108.
HCIHIMI-v1-2011-KotaniHKA #information management #using
Characteristics of Information Transmission Rates Using Noncontact Tactile Display (KK, MH, NK, TA), pp. 450–453.
HCIHIMI-v1-2011-LeeKW #authentication #multi #smarttech #using
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
HCIHIMI-v1-2011-MitaWKM #case study #communication #using
A Study of Attention Control by Using Eye Communication with an Anthropomorphic Agent (TM, RW, NK, KM), pp. 603–611.
HCIHIMI-v1-2011-NakanishiY #using
Applicability of Touch Sense Controllers Using Warm and Cold Sensations (MN, SY), pp. 470–477.
HCIHIMI-v1-2011-TanakaYSN #comparison #using
Characteristics of Comfortable Sheet Switches on Control Panels of Electrical Appliances: Comparison Using Older and Younger Users (YT, YY, MS, MN), pp. 498–507.
HCIHIMI-v1-2011-Terawaki #education #elicitation #information management #requirements
Supporting of Requirements Elicitation for Ensuring Services of Information Systems Used for Education (YT), pp. 58–65.
HCIHIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #using #visualisation
Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
HCIHIMI-v2-2011-BagciMKKT #adaptation #recognition #using
Object and Scene Recognition Using Color Descriptors and Adaptive Color KLT (VHB, MGM, RK, RK, VT), pp. 355–363.
HCIHIMI-v2-2011-FagerstromG #empirical #facebook #network #social #using
Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
HCIHIMI-v2-2011-FukadaKKH #evaluation #information management #user interface #using
Evaluation of Disaster Information Management System Using Tabletop User Interfaces (HF, KK, AK, NH), pp. 373–380.
HCIHIMI-v2-2011-SagaTKTM #analysis #comparison #using
Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HCIHIMI-v2-2011-TanumaSNN #artificial reality #design #using
Comfortable Design of Task-Related Information Displayed Using Optical See-Through Head-Mounted Display (KT, TS, MN, MN), pp. 419–429.
HCIIDGD-2011-BrandND #embedded #interactive #network #social #using
Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
HCIIDGD-2011-GaoQ #analysis #distributed #simulation
Analysis of the Applied Pattern of Distributed Computing Used in Simulation (SfG, HQ), pp. 152–158.
HCIIDGD-2011-SalgadoSL #design #using
Using Metaphors to Explore Cultural Perspectives in Cross-Cultural Design (LCdCS, CSdS, CFL), pp. 94–103.
HCIOCSC-2011-Alducin-QuinteroCMGJ #design #modelling #process #using
Productivity Improvement by Using Social-Annotations about Design Intent in CAD Modelling Process (GAQ, MC, JMG, DAGZ, MDJ), pp. 153–161.
HCIOCSC-2011-BaekSH #research #using
Meet Researcher in the Real World Using the ConAR: Context-Aware Researcher (SWB, JS, TDH), pp. 12–19.
HCIOCSC-2011-SreenivasanLG #twitter
Tweet Me Home: Exploring Information Use on Twitter in Crisis Situations (NDS, CSL, DHLG), pp. 120–129.
HCIOCSC-2011-YoshinoM #communication #using
GAZO GAZO KUN: Photo-Sharing System Using an Anthropomorphic Photo Frame for Communication Support (TY, TM), pp. 297–305.
AdaEuropeAdaEurope-2011-ChilAOP #ada #interface #using
Using Robotics as a Motivational Tool: An Ada Interface to a Pioneer Robot (RC, DA, FJO, JAP), pp. 147–159.
AdaEuropeAdaEurope-2011-OLeary #reliability #using #web #web service
Assuring Software Reliability While Using Web Services and Commercial Products (JO), pp. 1–16.
AdaEuropeAdaEurope-2011-SaezTC #ada #framework #multi #realtime #using
A Real-Time Framework for Multiprocessor Platforms Using Ada 2012 (SS, ST, AC), pp. 46–60.
AdaSIGAda-2011-BeltHRCHD #contract #execution #symbolic computation #using
Enhancing spark’s contract checking facilities using symbolic execution (JB, JH, R, PC, DH, XD), pp. 47–60.
CAiSECAiSE-2011-BiderJS #architecture #case study #communication #experience #process #using
Experiences of Using Different Communication Styles in Business Process Support Systems with the Shared Spaces Architecture (IB, PJ, RS), pp. 299–313.
CAiSECAiSE-2011-GuabtniNB #correlation #graph #interactive #using
Using Graph Aggregation for Service Interaction Message Correlation (AG, HRMN, BB), pp. 642–656.
CAiSECAiSE-2011-LemaitreH #database #evaluation #fault #framework #quality #taxonomy #using
Quality Evaluation and Improvement Framework for Database Schemas — Using Defect Taxonomies (JL, JLH), pp. 536–550.
CAiSECAiSE-2011-NobauerSMZ #elicitation #enterprise #named #requirements #using
S3C: Using Service Discovery to Support Requirements Elicitation in the ERP Domain (MN, NS, NAMM, KZ), pp. 18–32.
CAiSECAiSE-2011-RoySSWB #design #enterprise #using
Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions (MR, BS, DS, IW, BB), pp. 566–581.
CAiSECAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
CAiSECAiSE-2011-SpindlerLNGN #using
Using Synchronised Tag Clouds for Browsing Data Collections (AdS, SL, MN, MG, MCN), pp. 214–228.
EDOCEDOC-2011-AdriansyahDA #consistency #cost analysis #using
Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
EDOCEDOC-2011-CurleyK #case study #framework #maturity #using
Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
EDOCEDOC-2011-HildebrandtMS #design #graph #using
Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs (TTH, RRM, TS), pp. 161–170.
EDOCEDOC-2011-Hull #flexibility #towards #using
Towards Flexible Service Interoperation Using Business Artifacts (RH), pp. 20–21.
ICEISICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system #using
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management #using
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-Kim #communication #network #using
CRL Distribution using an Alternative Communication Media for Vehicular Networks (HK), pp. 217–222.
ICEISICEIS-v1-2011-RamirezC #fault #process #using
Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
ICEISICEIS-v1-2011-VaneaP #metadata #multi #ontology #semantics #using
Semantically Enhancing Multimedia Data Warehouses — Using Ontologies as Part of the Metadata (AV, RP), pp. 163–168.
ICEISICEIS-v2-2011-KisilevichKBTR #open source #tool support #using
Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (SK, DAK, RB, MT, LR), pp. 147–156.
ICEISICEIS-v2-2011-LiOAK #fault #identification #modelling #network #using
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
ICEISICEIS-v2-2011-TarsauliyaTS #network #search-based #using
Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
ICEISICEIS-v2-2011-TianZX #analysis #case study #network #social #using
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEISICEIS-v2-2011-ZhuXM #assessment #network #risk management #using
Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEISICEIS-v3-2011-BhuiyanRH #case study #modelling #multi #using
Supporting Business Modeling using Multiple Notations — A Case Study (MB, SR, KH), pp. 301–306.
ICEISICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEISICEIS-v3-2011-PapatheocharousTYA #agile #cost analysis #development #diagrams #estimation #modelling #using
Cost Modeling and Estimation in Agile Software Development Environments using Influence Diagrams (EP, DT, PSY, ASA), pp. 117–127.
ICEISICEIS-v3-2011-WangWWL #modelling #using #workflow
Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
ICEISICEIS-v4-2011-Ganesan #enterprise #framework #modelling #process #using
Composite Enterprise Process Modeling (CEProM) Framework — Setting up a Process Modeling Center of Excellence using CEProM Framework (EG), pp. 378–383.
ICEISICEIS-v4-2011-LuCGD #algorithm #multi #network #optimisation #quality #using
Quality of Service Optimization of Wireless Sensor Networks using a Multi-objective Immune Co-evolutionary Algorithm (XL, ZRC, LG, YD), pp. 160–164.
ICEISICEIS-v4-2011-Naderipour #ad hoc #industrial #mining #process #using
Mining of Ad-hoc Business Processes using Microsoft Sharepoint, Nitro & Prom 6.0 — An Industrial Practice (FN), pp. 413–418.
ICEISICEIS-v4-2011-OuazzaneAKL #design #framework #using #web
An e-Business Framework Design using Enhanced Web 2.0 Technology (KO, MSA, HBK, JL), pp. 97–102.
ICEISICEIS-v4-2011-ShiL #analysis
Analysis of the Economic Benefit of Used Batteries based on Reverse Logistics (XS, ZL), pp. 736–742.
CIKMCIKM-2011-Ando #encoding #relational #using
Latent feature encoding using dyadic and relational data (SA), pp. 2201–2204.
CIKMCIKM-2011-BanerjeeC #distributed #feature model #privacy #using
Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKMCIKM-2011-BicerTN #keyword #modelling #ranking #using
Ranking support for keyword search on structured data using relevance models (VB, TT, RN), pp. 1669–1678.
CIKMCIKM-2011-BingLW #query #social #topic #using
Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKMCIKM-2011-BykauMRV #evolution #query #using
Supporting queries spanning across phases of evolving artifacts using Steiner forests (SB, JM, FR, YV), pp. 1649–1658.
CIKMCIKM-2011-DangXC #aspect-oriented #clustering #query #using
Inferring query aspects from reformulations using clustering (VD, XX, WBC), pp. 2117–2120.
CIKMCIKM-2011-GangulyLMJ #feedback #pseudo #query #reduction #using
Patent query reduction using pseudo relevance feedback (DG, JL, WM, GJFJ), pp. 1953–1956.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-Garcia-Alvarado0O #named #ontology #performance #using
ONTOCUBE: efficient ontology extraction using OLAP cubes (CGA, ZC, CO), pp. 2429–2432.
CIKMCIKM-2011-HeerschopGHFKJ #analysis #using
Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKMCIKM-2011-HeRSOQ #case study #generative #using
Generating links to background knowledge: a case study using narrative radiology reports (JH, MdR, MS, RCvO, YQ), pp. 1867–1876.
CIKMCIKM-2011-HuiHLW #statistics #using
Relevance weighting using within-document term statistics (KH, BH, TL, BW), pp. 99–104.
CIKMCIKM-2011-HuSPW
Effects of search success on search engine re-use (VH, MS, JP, RWW), pp. 1841–1846.
CIKMCIKM-2011-HuTL #microblog #semantics #using
Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
CIKMCIKM-2011-JacobDG #classification #corpus #multi #social #using
Classification and annotation in social corpora using multiple relations (YJ, LD, PG), pp. 1215–1220.
CIKMCIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic #using
Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKMCIKM-2011-KongDH #matrix #robust #using
Robust nonnegative matrix factorization using L21-norm (DK, CHQD, HH), pp. 673–682.
CIKMCIKM-2011-KustarevULGSS #metric #using
Smoothing NDCG metrics using tied scores (AK, YU, YL, EG, IS, PS), pp. 2053–2056.
CIKMCIKM-2011-LeeRK #algorithm #recognition #using
Named entity recognition using a modified Pegasos algorithm (CL, PMR, HK), pp. 2337–2340.
CIKMCIKM-2011-LinTC #classification #independence #sentiment #using #word
Language-independent sentiment classification using three common words (ZL, ST, XC), pp. 1041–1046.
CIKMCIKM-2011-LiuWZ #clustering #feature model #using
Feature selection using hierarchical feature clustering (HL, XW, SZ), pp. 979–984.
CIKMCIKM-2011-MagdyJ #performance #using
An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKMCIKM-2011-MaLL #using
Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKMCIKM-2011-NiuLX #graph #named #ranking #using
DIGRank: using global degree to facilitate ranking in an incomplete graph (XN, LL, KX), pp. 2297–2300.
CIKMCIKM-2011-OzertemVL #set #using
Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKMCIKM-2011-Pasca #query #using #web #what
Asking what no one has asked before: using phrase similarities to generate synthetic web search queries (MP), pp. 1347–1352.
CIKMCIKM-2011-PeelWZ #string #using
Collection-based compression using discovered long matching strings (AP, AW, JZ), pp. 2361–2364.
CIKMCIKM-2011-PilzP #distance #using
From names to entities using thematic context distance (AP, GP), pp. 857–866.
CIKMCIKM-2011-QuattroneCMFU #effectiveness #folksonomy #retrieval #similarity #using
Effective retrieval of resources in folksonomies using a new tag similarity measure (GQ, LC, PDM, EF, DU), pp. 545–550.
CIKMCIKM-2011-SoodL #detection #probability #using
Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKMCIKM-2011-VinzamuriK #classification #convergence #design #using
Designing an ensemble classifier over subspace classifiers using iterative convergence routine (BV, KK), pp. 693–698.
CIKMCIKM-2011-VirgilioM #calculus #data analysis #using
RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
CIKMCIKM-2011-WangZLBW #classification #multi #random #using
Using random walks for multi-label classification (CW, WZ, ZL, YB, JW), pp. 2197–2200.
CIKMCIKM-2011-WeichselbraunGS #game studies #sentiment #using
Using games with a purpose and bootstrapping to create domain-specific sentiment lexicons (AW, SG, AS), pp. 1053–1060.
CIKMCIKM-2011-WesselOVBK #3d #modelling #performance #retrieval #using
Efficient retrieval of 3D building models using embeddings of attributed subgraphs (RW, SO, RV, IB, RK), pp. 2097–2100.
CIKMCIKM-2011-WuQD #owl #pipes and filters #using
Finding all justifications of OWL entailments using TMS and MapReduce (GW, GQ, JD), pp. 1425–1434.
ECIRECIR-2011-AktolgaAS #ranking #using
Passage Reranking for Question Answering Using Syntactic Structures and Answer Types (EA, JA, DAS), pp. 617–628.
ECIRECIR-2011-AlbakourKNKSFR #evaluation #named #query #using
AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIRECIR-2011-AlonsoB #crowdsourcing #design #implementation #using
Design and Implementation of Relevance Assessments Using Crowdsourcing (OA, RABY), pp. 153–164.
ECIRECIR-2011-BadrinathVM #query #summary #using
Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
ECIRECIR-2011-BuccioMS #framework #predict #towards #using
Towards Predicting Relevance Using a Quantum-Like Framework (EDB, MM, DS), pp. 755–758.
ECIRECIR-2011-GeraniKCC #retrieval #using
Personal Blog Retrieval Using Opinion Features (SG, MK, MJC, FC), pp. 747–750.
ECIRECIR-2011-HannonMS #recommendation #twitter
Finding Useful Users on Twitter: Twittomender the Followee Recommender (JH, KM, BS), pp. 784–787.
ECIRECIR-2011-KinsellaPB #classification #metadata #social #social media #topic #using
Topic Classification in Social Media Using Metadata from Hyperlinked Objects (SK, AP, JGB), pp. 201–206.
ECIRECIR-2011-MagdyJ #black box #question
Should MT Systems Be Used as Black Boxes in CLIR? (WM, GJFJ), pp. 683–686.
ECIRECIR-2011-OhCM #classification #modelling #scalability #taxonomy #using
Text Classification for a Large-Scale Taxonomy Using Dynamically Mixed Local and Global Models for a Node (HSO, YC, SHM), pp. 7–18.
ECIRECIR-2011-PhelanMBS #recommendation #twitter #using
Terms of a Feather: Content-Based News Recommendation and Discovery Using Twitter (OP, KM, MB, BS), pp. 448–459.
ECIRECIR-2011-ZhaoJWHLYL #modelling #topic #twitter #using
Comparing Twitter and Traditional Media Using Topic Models (WXZ, JJ, JW, JH, EPL, HY, XL), pp. 338–349.
ICMLICML-2011-CrammerG #adaptation #classification #feedback #multi #using
Multiclass Classification with Bandit Feedback using Adaptive Regularization (KC, CG), pp. 273–280.
ICMLICML-2011-HockingVBJ #algorithm #clustering #named #using
Clusterpath: an Algorithm for Clustering using Convex Fusion Penalties (TH, JPV, FRB, AJ), pp. 745–752.
ICMLICML-2011-HuWC #coordination #kernel #learning #named #parametricity #scalability #using
BCDNPKL: Scalable Non-Parametric Kernel Learning Using Block Coordinate Descent (EH, BW, SC), pp. 209–216.
ICMLICML-2011-JawanpuriaNR #kernel #learning #performance #using
Efficient Rule Ensemble Learning using Hierarchical Kernels (PJ, JSN, GR), pp. 161–168.
ICMLICML-2011-JegelkaB11a #approximate #bound #using
Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICMLICML-2011-JetchevT #feedback #retrieval #using
Task Space Retrieval Using Inverse Feedback Control (NJ, MT), pp. 449–456.
ICMLICML-2011-KamisettyXL #approximate #correlation #using
Approximating Correlated Equilibria using Relaxations on the Marginal Polytope (HK, EPX, CJL), pp. 1153–1160.
ICMLICML-2011-LiuI #bound #difference #using
Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICMLICML-2011-Potetz #linear #problem #using
Estimating the Bayes Point Using Linear Knapsack Problems (BP), pp. 257–264.
ICMLICML-2011-SuSM #classification #multi #naive bayes #scalability #using
Large Scale Text Classification using Semisupervised Multinomial Naive Bayes (JS, JSS, SM), pp. 97–104.
ICMLICML-2011-YangR #learning #on the #visual notation
On the Use of Variational Inference for Learning Discrete Graphical Model (EY, PDR), pp. 1009–1016.
KDDKDD-2011-ApplegateDKU #clustering #distance #multi #using
Unsupervised clustering of multidimensional distributions using earth mover distance (DA, TD, SK, SU), pp. 636–644.
KDDKDD-2011-DalviKMR #nearest neighbour #using
Sampling hidden objects using nearest-neighbor oracles (NND, RK, AM, VR), pp. 1325–1333.
KDDKDD-2011-Dhurandhar #predict #using
Improving predictions using aggregate information (AD), pp. 1118–1126.
KDDKDD-2011-EneIM #clustering #performance #pipes and filters #using
Fast clustering using MapReduce (AE, SI, BM), pp. 681–689.
KDDKDD-2011-HendersonGLAETF #graph #mining #recursion #using
It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
KDDKDD-2011-Inchiosa #data mining #mining #scalability #using
Accelerating large-scale data mining using in-database analytics (MEI), p. 778.
KDDKDD-2011-LeeOYK #privacy #semantics #using
Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDDKDD-2011-MenonCGAK #collaboration #predict #using
Response prediction using collaborative filtering with hierarchies and side-information (AKM, KPC, SG, DA, NK), pp. 141–149.
KDDKDD-2011-MesterharmP #algorithm #learning #online #using
Active learning using on-line algorithms (CM, MJP), pp. 850–858.
KDDKDD-2011-PereiraB #classification #functional #using
Classification of functional magnetic resonance imaging data using informative pattern features (FP, MB), pp. 940–946.
KDDKDD-2011-SatpalBSRS #information management #logic #markov #network #using #web
Web information extraction using markov logic networks (SS, SB, SS, RR, PS), pp. 1406–1414.
KDDKDD-2011-SimonLJV #comprehension #image #using
Understanding atrophy trajectories in alzheimer’s disease using association rules on MRI images (GJS, PWL, CRJJ, PV), pp. 369–376.
KDIRKDIR-2011-ArmanoGV #concept #semantics #using
Semantic Enrichment of Contextual Advertising by using Concepts (GA, AG, EV), pp. 232–237.
KDIRKDIR-2011-BallesterosFDHG #analysis #dependence #using
Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIRKDIR-2011-BressoBSMKSND #mining #reduction
Use of Domain Knowledge for Dimension Reduction — Application to Mining of Drug Side Effects (EB, SB, MST, GM, ASK, MS, AN, MDD), pp. 271–276.
KDIRKDIR-2011-GuoK #ontology #research #using
Discovering Relationship Associations from the Literature Related to Research Projects in Sustainability Science using Ontology and Inference (WG, SBK), pp. 390–393.
KDIRKDIR-2011-LachetarB #algorithm #categorisation #metadata #using
Application of an Ant Colony Algorithm — For Song Categorising using Metadata (NL, HB), pp. 379–384.
KDIRKDIR-2011-LiVM #graph #learning #relational #using #visual notation
Unsupervised Handwritten Graphical Symbol Learning — Using Minimum Description Length Principle on Relational Graph (JL, CVG, HM), pp. 172–178.
KDIRKDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation #using
Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KDIRKDIR-2011-MauleKR #approach #automation #using
Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
KDIRKDIR-2011-OmerBG #algorithm #mining #motivation #using
A New Frequent Similar Tree Algorithm Motivated by Dom Mining — Using RTDM and its New Variant — SiSTeR (OB, RB, SG), pp. 238–243.
KDIRKDIR-2011-PrachuabsupakijS #classification #multi #set #using
Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
KDIRKDIR-2011-RavulaCL #dynamic analysis #using
Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
KDIRKDIR-2011-ReuterC #identification #learning #similarity #using
Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
KDIRKDIR-2011-RomeiT #process #programming #using #xquery
Programming the KDD Process using XQuery (AR, FT), pp. 131–139.
KEODKEOD-2011-AbbesZN #learning #ontology #semantics
Evaluating Semantic Classes Used for Ontology Building and Learning from Texts (SBA, HZ, AN), pp. 445–448.
KEODKEOD-2011-GerberGM #ambiguity #consistency #development #ontology #standard #using
Using Formal Ontologies for the Development of Consistent and Unambiguous Financial Accounting Standards (MCG, AG, AvdM), pp. 419–424.
KEODKEOD-2011-KohnMSL #complexity #ontology
Use of Existing Ontologies as Input for Structural Complexity Management — Reducing the Effort for Analysing and Improving Engineering Systems (AK, MM, HXS, UL), pp. 195–201.
KEODKEOD-2011-MendesFS #using
Comparing Services using DEMO (CM, JF, MMdS), pp. 528–537.
KEODKEOD-2011-OkumuraH #concept #using
A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KEODKEOD-2011-Rios-AlvaradoLS #taxonomy #using #web
Structuring Taxonomies by using Linguistic Patterns and WordNet on Web Search (ABRA, ILA, VSS), pp. 273–278.
KEODKEOD-2011-SuzukiF #classification #documentation #multi #using
Multi-labeled Patent Document Classification using Technical Term Thesaurus (YS, FF), pp. 425–428.
KMISKMIS-2011-AlaviJY #performance
An Investigation of the Use of KMS on Clinical Performance (MA, SLJ, YY), pp. 236–240.
KMISKMIS-2011-Chebel-MorelloHZ #adaptation #modelling #reasoning #using
Adaptation based on Knowledge Models for Diagnostic Systems using Case-base Reasoning (BCM, MKH, NZ), pp. 223–229.
KMISKMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism #using
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMISKMIS-2011-FortierS #modelling #process #requirements #using
Defining Information Requirements — Using Business Process Modeling for Incident Response for Chemical Facilities (SCF, GLS), pp. 411–417.
KMISKMIS-2011-Grim-YefsahRT11a #network #process #robust #using
Using Information of an Informal Network to Evaluate Business Process Robustness (MGY, CRS, VTG), pp. 430–435.
KMISKMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard #using
Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
KMISKMIS-2011-Nishioka #process #using
Quotation Process Management of One-of-a-kind Production using PSLX Information Model (YN), pp. 167–172.
KMISKMIS-2011-SchmidlK #information management #using
Using Task Histories to Support Person-to-person Knowledge Exchange — Extracting and using Contextual Overlap and Levels of Expertise to Connect Knowledge Workers (JS, HK), pp. 77–86.
KMISKMIS-2011-SmirnovSKJSO #case study #industrial
Ontology-driven Product Configuration — Industrial Use Case (AVS, NS, AK, TJ, MS, AO), pp. 38–47.
MLDMMLDM-2011-AlshukriCZ #bound #detection #incremental #random #using
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDMMLDM-2011-CataltepeSBE #classification #using
Collective Classification Using Heterogeneous Classifiers (, AS, KB, AE), pp. 155–169.
MLDMMLDM-2011-ChenER #mining #parametricity #using
Mining Spatial Trajectories Using Non-parametric Density Functions (CSC, CFE, NJR), pp. 496–510.
MLDMMLDM-2011-Garcia-ConstantinoCNRST #classification #generative #summary #using
An Investigation Concerning the Generation of Text Summarisation Classifiers Using Secondary Data (MGC, FC, PJN, AR, CS, AT), pp. 387–398.
MLDMMLDM-2011-GunesCO #algorithm #classification #named #novel #relational #search-based #using
GA-TVRC: A Novel Relational Time Varying Classifier to Extract Temporal Information Using Genetic Algorithms (IG, , SGÖ), pp. 568–583.
MLDMMLDM-2011-Kessl #mining #parallel #using
Static Load Balancing of Parallel Mining of Frequent Itemsets Using Reservoir Sampling (RK), pp. 553–567.
MLDMMLDM-2011-PerezR #array #detection #using
Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDMMLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics #using
A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSysRecSys-2011-DalyG #effectiveness #recommendation #social #using
Effective event discovery: using location and social information for scoping event recommendations (EMD, WG), pp. 277–280.
RecSysRecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment #using
Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSysRecSys-2011-KatzOSRS #collaboration #using #wiki
Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
RecSysRecSys-2011-SekoYMM #behaviour #recommendation #representation #using
Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
SEKESEKE-2011-AlmeidaMA #analysis #execution #process #using
Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKESEKE-2011-AndradeDBW #approach #communication #documentation #retrieval #using
An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
SEKESEKE-2011-AntunesCCG #development #information management #using
Using Contextual Information to Improve Awareness in Software Development(S) (BA, JC, PC, PG), pp. 349–352.
SEKESEKE-2011-BarrosNHT #case study #natural language #specification
The ucsCNL: A Controlled Natural Language for Use Case Specifications (FAB, LN, EH, DT), pp. 250–253.
SEKESEKE-2011-BhattacharyaCSK #enterprise #using
Dynamic Service Choreography using Context Aware Enterprise Service Bus (SB, JC, SS, AK), pp. 319–324.
SEKESEKE-2011-BragaD #detection #information management #tool support #using
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKESEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability #using
Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKESEKE-2011-FerreiraS #behaviour #case study
Use Case Driven Extension of ProjectIT-RSL to Support Behavioral Concerns (DdAF, ARdS), pp. 740–745.
SEKESEKE-2011-FronzaSSV #predict #using
Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SEKESEKE-2011-GregoriadesLP11a #calculus #risk management #using
Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SEKESEKE-2011-Kaiser #concurrent #debugging #higher-order #using
Constructing Subtle Concurrency Bugs Using Synchronization-Centric Second-Order Mutation Operators (LWGK), pp. 244–249.
SEKESEKE-2011-MachadoAF #evolution #requirements #semantics #using
Using Semantic Annotations for Supporting Requirements Evolution (BNM, LdOA, RdAF), pp. 185–190.
SEKESEKE-2011-RochaV #empirical #how #java
How Annotations are Used in Java: An Empirical Study (HR, MTV), pp. 426–431.
SEKESEKE-2011-SanfordWX #analysis #modelling #security #using
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-ScatalonGC #approach #ontology #using
Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
SEKESEKE-2011-SouzaSMCSZ #concurrent #quality #reachability #testing #using
Using Coverage and Reachability Testing to Improve Concurrent Program Testing Quality (SdRSdS, PSLdS, MCCM, MSC, AdSS, EZ), pp. 207–212.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKESEKE-2011-SunWH #architecture #design #modelling #ontology #using
Design Software Architecture Models using Ontology (JS, HHW, TH), pp. 191–196.
SEKESEKE-2011-VilkomirKT #algorithm #case study #interface #testing #using
Interface Testing Using a Subgraph Splitting Algorithm: A Case Study (SV, AAK, NT), pp. 219–224.
SEKESEKE-2011-WagnerFF #process #security #using
Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
SEKESEKE-2011-WangKN #empirical #metric #using
An Empirical Study of Software Metrics Selection Using Support Vector Machine (HW, TMK, AN), pp. 83–88.
SIGIRSIGIR-2011-AgeevGLA #game studies #interactive #modelling #using #web
Find it if you can: a game for modeling different types of web search success using interaction data (MA, QG, DL, EA), pp. 345–354.
SIGIRSIGIR-2011-BennettRWY #metadata #personalisation #using #web
Inferring and using location metadata to personalize web search (PNB, FR, RWW, EY), pp. 135–144.
SIGIRSIGIR-2011-BlancoHHMPTT #crowdsourcing #evaluation #reliability #using
Repeatable and reliable search system evaluation using crowdsourcing (RB, HH, DMH, PM, JP, HST, DTT), pp. 923–932.
SIGIRSIGIR-2011-BouadjenekHBD #personalisation #query #social #using
Personalized social query expansion using social bookmarking systems (MRB, HH, MB, JD), pp. 1113–1114.
SIGIRSIGIR-2011-Campos #analysis #query #using #web
Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIRSIGIR-2011-CumminsJO #performance #predict #query #standard #using
Improved query performance prediction using standard deviation (RC, JMJ, CO), pp. 1089–1090.
SIGIRSIGIR-2011-DingS #documentation #performance #retrieval #using
Faster top-k document retrieval using block-max indexes (SD, TS), pp. 993–1002.
SIGIRSIGIR-2011-InagakiBCM #mobile #using #web
Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIRSIGIR-2011-JethavaCBBD #identification #multi #scalability #using
Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
SIGIRSIGIR-2011-LappasPS #mining #network #social #using
Mining tags using social endorsement networks (TL, KP, TS), pp. 195–204.
SIGIRSIGIR-2011-LeeHWHS #dataset #graph #image #learning #multi #pipes and filters #scalability #using
Multi-layer graph-based semi-supervised learning for large-scale image datasets using mapreduce (WYL, LCH, GLW, WHH, YFS), pp. 1121–1122.
SIGIRSIGIR-2011-Li11a #information retrieval #using
Domain-specific information retrieval using rcommenders (WL), pp. 1327–1328.
SIGIRSIGIR-2011-LiDS #concept #recommendation #semantics #using
Semantic tag recommendation using concept model (CL, AD, AS), pp. 1159–1160.
SIGIRSIGIR-2011-LiHZW #information retrieval #query #segmentation #using
Unsupervised query segmentation using clickthrough for information retrieval (YL, BJPH, CZ, KW), pp. 285–294.
SIGIRSIGIR-2011-LimsopathamSMO #using
Disambiguating biomedical acronyms using EMIM (NL, RLTS, CM, IO), pp. 1213–1214.
SIGIRSIGIR-2011-LiZMWCGX #comparative #comparison #using
Product comparison using comparative relations (SL, ZJZ, ZM, MW, TSC, JG, WX), pp. 1151–1152.
SIGIRSIGIR-2011-MoshfeghiPJ #collaboration #semantics #using
Handling data sparsity in collaborative filtering using emotion and semantic based features (YM, BP, JMJ), pp. 625–634.
SIGIRSIGIR-2011-OchiOO #predict #rating #using #word
Rating prediction using feature words extracted from customer reviews (MO, MO, RO), pp. 1205–1206.
SIGIRSIGIR-2011-PaikPP #algorithm #novel #statistics #using
A novel corpus-based stemming algorithm using co-occurrence statistics (JHP, DP, SKP), pp. 863–872.
SIGIRSIGIR-2011-SakaiS #using
Evaluating diversified search results using per-intent graded relevance (TS, RS), pp. 1043–1052.
SIGIRSIGIR-2011-Wang #comprehension #information management #recommendation #using
Understanding and using contextual information in recommender systems (LW), pp. 1329–1330.
SIGIRSIGIR-2011-WangHND #classification #information management #matrix #using #web
Cross-language web page classification via dual knowledge transfer using nonnegative matrix tri-factorization (HW, HH, FN, CHQD), pp. 933–942.
SIGIRSIGIR-2011-WuYLLYX #learning #rank #using
Learning to rank using query-level regression (JW, ZY, YL, HL, ZY, KX), pp. 1091–1092.
SIGIRSIGIR-2011-YangLSZZ #collaboration #learning #recommendation #using
Collaborative competitive filtering: learning recommender using context of user choice (SHY, BL, AJS, HZ, ZZ), pp. 295–304.
SIGIRSIGIR-2011-ZhaoHH #information retrieval #named #probability #using
CRTER: using cross terms to enhance probabilistic information retrieval (JZ, JXH, BH), pp. 155–164.
SIGIRSIGIR-2011-ZhouHH #ad hoc #estimation #probability #using
Enhancing ad-hoc relevance weighting using probability density estimation (XZ, JXH, BH), pp. 175–184.
BXBX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification #using
Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
BXBX-2011-Cleve #co-evolution #source code #using
Co-evolving schemas and programs using coupled transformations (AC), p. 54.
ECMFAECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements #using
Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
ECMFAECMFA-2011-YueAB #automation #case study #state machine #testing #uml
Automated Transition from Use Cases to UML State Machines to Support State-Based Testing (TY, SA, LCB), pp. 115–131.
MODELSMoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml #using
An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
MODELSMoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml #using
Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
MODELSMoDELS-2011-IzukuraYOSKX #approach #development #modelling #using
Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #using #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MODELSMoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling #using
Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
MODELSMoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml #using
An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
MODELSMoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml #using
Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
MODELSMoDELS-2011-IzukuraYOSKX #approach #development #modelling #using
Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #using #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MODELSMoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling #using
Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
ECOOPECOOP-2011-Duala-EkokoR #api #recommendation #using
Using Structure-Based Recommendations to Facilitate Discoverability in APIs (EDE, MPR), pp. 79–104.
ECOOPECOOP-2011-RichardsHBV #javascript #scalability
The Eval That Men Do — A Large-Scale Study of the Use of Eval in JavaScript Applications (GR, CH, BB, JV), pp. 52–78.
OOPSLAOOPSLA-2011-Golan-GuetaBARSY #automation #using
Automatic fine-grain locking using shape properties (GGG, NGB, AA, GR, MS, EY), pp. 225–242.
OOPSLAOOPSLA-2011-KeLZBJD #dependence #parallel #programming #using
Safe parallel programming using dynamic dependence hints (CK, LL, CZ, TB, BJ, CD), pp. 243–258.
OOPSLAOOPSLA-2011-WeeratungeZJ #using
Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
PLATEAUPLATEAU-2011-BarisicAGB #case study #domain-specific language #quality
Quality in use of domain-specific languages: a case study (AB, VA, MG, BB), pp. 65–72.
PLATEAUPLATEAU-2011-LaTozaM #design #developer #tool support
Designing useful tools for developers (TDL, BAM), pp. 45–50.
PLATEAUPLATEAU-2011-ShonleGL #design #using
Using metaphors from natural discussion to improve the design of arcum (MS, WGG, SL), pp. 39–44.
PLATEAUPLATEAU-2011-StefikSSS #comparison #empirical #perl #programming language #using
An empirical comparison of the accuracy rates of novices using the quorum, perl, and randomo programming languages (AS, SS, MS, KS), pp. 3–8.
TOOLSTOOLS-EUROPE-2011-KuhlmannHG #modelling #ocl #satisfiability #validation
Extensive Validation of OCL Models by Integrating SAT Solving into USE (MK, LH, MG), pp. 290–306.
LOPSTRLOPSTR-2011-FioravantiPPS #using
Using Real Relaxations during Program Specialization (FF, AP, MP, VS), pp. 106–122.
LOPSTRLOPSTR-2011-Gallagher #analysis #logic programming #source code #using
Analysis of Logic Programs Using Regular Tree Languages — (Extended Abstract) (JPG), pp. 1–3.
LOPSTRLOPSTR-2011-PilozziS #analysis #self #termination #using
Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification #using
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
PPDPPPDP-2011-InabaHHKN #higher-order #logic #monad #using #verification
Graph-transformation verification using monadic second-order logic (KI, SH, ZH, HK, KN), pp. 17–28.
PADLPADL-2011-ChristakisS #detection #fault #message passing #static analysis #using
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADLPADL-2011-RedlEK #declarative #set #using
Declarative Belief Set Merging Using Merging Plans (CR, TE, TK), pp. 99–114.
PADLPADL-2011-SalgueiroDBA #constraints #detection #using
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
POPLPOPL-2011-DilligDA #precise #reasoning #source code #using
Precise reasoning for programs using containers (ID, TD, AA), pp. 187–200.
POPLPOPL-2011-Gulwani #automation #spreadsheet #string #using
Automating string processing in spreadsheets using input-output examples (SG), pp. 317–330.
POPLPOPL-2011-RamseyD #composition #dependent type #independence #low level #type system #using
Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
RERE-2011-FranchMTC #framework #modelling #on the
On the joint use of i* with other modelling frameworks: A vision paper (XF, AM, JT, CC), pp. 133–142.
REFSQREFSQ-2011-DhunganaSG #elicitation #modelling #product line #requirements #research #using #variability
Research Preview: Supporting End-User Requirements Elicitation Using Product Line Variability Models (DD, NS, FG), pp. 66–71.
REFSQREFSQ-2011-LauesenK #case study
Use Cases versus Task Descriptions (SL, MAK), pp. 106–120.
SACSAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict #using
Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
SACSAC-2011-BelcaidBHP #clustering #performance #using
Efficient clustering of populations using a minimal SNP panel (MB, KB, DH, GP), pp. 83–88.
SACSAC-2011-ChangH #approach #model transformation #multi #using #verification
A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
SACSAC-2011-FabreKT #lessons learnt #robust #using
Robustness of automotive applications using reflective computing: lessons learnt (JCF, MOK, FT), pp. 230–235.
SACSAC-2011-HeinenE #incremental #modelling #using
Incremental feature-based mapping from sonar data using Gaussian mixture models (MRH, PME), pp. 1370–1375.
SACSAC-2011-HuLCHXL #image #segmentation #using
Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
SACSAC-2011-Jamil #graph #query #unification #using
Computing subgraph isomorphic queries using structural unification and minimum graph structures (HMJ), pp. 1053–1058.
SACSAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech #using
iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SACSAC-2011-KostakisKMM #comparison #graph #using
Improved call graph comparison using simulated annealing (OK, JK, HM, KM), pp. 1516–1523.
SACSAC-2011-LeungJ #data type #mining #nondeterminism #using
Frequent itemset mining of uncertain data streams using the damped window model (CKSL, FJ), pp. 950–955.
SACSAC-2011-LinXYYZGQCG #anti #hardware #named #using
SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SACSAC-2011-Liu #agile #configuration management #using
Rapid application configuration in Amazon cloud using configurable virtual appliances (HL), pp. 147–154.
SACSAC-2011-MakanjuZM #retrieval #using
Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SACSAC-2011-MeerBHFK #automation #framework #using #web
A framework for automatic annotation of web pages using the Google rich snippets vocabulary (JvdM, FB, FH, FF, UK), pp. 765–772.
SACSAC-2011-NakajimaLYZGXYDQCG #hybrid #optimisation #using #virtual machine
Optimizing virtual machines using hybrid virtualization (JN, QL, SY, MZ, SG, MX, PY, YD, ZQ, KC, HG), pp. 573–578.
SACSAC-2011-RamosCAA #case study #modelling #process #towards
Towards the improvement of use case models: the AIRDoc process (RAR, JBdC, JA, FMRA), pp. 708–709.
SACSAC-2011-SebastianC #approach #design #re-engineering #towards #using
Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-TrindadeR #3d #multi #navigation #using
Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
SACSAC-2011-VenkateshGBC #fixpoint #implementation #markov #modelling #recognition #speech #using
Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov models (NV, RG, RB, MGC), pp. 368–373.
SACSAC-2011-YuLGZZ #fault #modelling #multi #using
Locating faults using multiple spectra-specific models (KY, ML, QG, HZ, XZ), pp. 1404–1410.
SACSAC-2011-YuMGTBGGTL #using
System-level co-simulation of integrated avionics using polychrony (HY, YM, YG, JPT, LB, TG, PLG, AT, OL), pp. 354–359.
SACSAC-2011-ZhangWAWLL #performance #using
Fast lists intersection with Bloom filter using graphics processing units (FZ, DW, NA, GW, XL, JL), pp. 825–826.
SACSAC-2011-ZouaqGH #concept #graph #using
Ontologizing concept maps using graph theory (AZ, DG, MH), pp. 1687–1692.
ESEC-FSEESEC-FSE-2011-BarzilayHY #developer #social #social media #using
Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
ESEC-FSEESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability #using
Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
ESEC-FSEESEC-FSE-2011-LiCK #analysis #performance #points-to #using
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-PalmaST #interactive #requirements #smt #using
Using an SMT solver for interactive requirements prioritization (FP, AS, PT), pp. 48–58.
ESEC-FSEESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability #using
Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
ESEC-FSEESEC-FSE-2011-ZhengZL #api #recommendation #using #web
Cross-library API recommendation using web search engines (WZ, QZ, MRL), pp. 480–483.
ICSEICSE-2011-ArcuriB #algorithm #random #re-engineering #statistics #testing #using
A practical guide for using statistical tests to assess randomized algorithms in software engineering (AA, LCB), pp. 1–10.
ICSEICSE-2011-Bhattacharya #development #evolution #maintenance #using
Using software evolution history to facilitate development and maintenance (PB), pp. 1122–1123.
ICSEICSE-2011-CordeiroF #bound #concurrent #model checking #multi #smt #thread #using #verification
Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
ICSEICSE-2011-DietlDEMS #using
Building and using pluggable type-checkers (WD, SD, MDE, KM, TWS), pp. 681–690.
ICSEICSE-2011-FeinRSMGGBCLSMMSD #automation #deployment #tool support #using
Using MATCON to generate CASE tools that guide deployment of pre-packaged applications (EF, NR, SS, PM, SG, RG, MB, SKC, JL, VSS, SM, DM, BS, PD), pp. 1016–1018.
ICSEICSE-2011-Goeritzer #impact analysis #industrial #using
Using impact analysis in industry (RG), pp. 1155–1157.
ICSEICSE-2011-KamalrudinHG #case study #interactive #quality #requirements #using
Improving requirements quality using essential use case interaction patterns (MK, JGH, JCG), pp. 531–540.
ICSEICSE-2011-LimDF #identification #network #requirements #social #using
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSEICSE-2011-Malik #analysis #graph #using
Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSEICSE-2011-MurtazaMGL #fault #using
Diagnosing new faults using mutants and prior faults (SSM, NHM, MG, ZL), pp. 960–963.
ICSEICSE-2011-Smith #functional #requirements #security #testing #using
Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
ICSEICSE-2011-Thomas #mining #modelling #repository #topic #using
Mining software repositories using topic models (SWT), pp. 1138–1139.
ICSEICSE-2011-TofanGA #architecture #grid #using
Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
LDTALDTA-2011-SoderbergH #editing #jastadd #semantics #tool support #using
Building semantic editors using JastAdd: tool demonstration (ES, GH), p. 11.
SLESLE-2011-JoncheereS #composition #using #workflow
Uniform Modularization of Workflow Concerns Using Unify (NJ, RVDS), pp. 77–96.
SLESLE-2011-StappersWRAN #case study #domain-specific language #formal method #industrial #using
Formalizing a Domain Specific Language Using SOS: An Industrial Case Study (FPMS, SW, MAR, SA, IN), pp. 223–242.
PLEASEPLEASE-2011-Kulkarni #challenge
Use of SPLE to deliver custom solutions at product cost: challenges and a way forward (VK), pp. 1–5.
PLEASEPLEASE-2011-SunCGW #approach #feature model #using
Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
SPLCSPLC-2011-GhezziS #approach #model checking #non-functional #parametricity #performance #product line #towards #using #verification
Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
SPLCSPLC-2011-VolterV #domain-specific language #product line #using
Product Line Engineering Using Domain-Specific Languages (MV, EV), pp. 70–79.
ASPLOSASPLOS-2011-KamruzzamanST #manycore #migration #thread #using
Inter-core prefetching for multicore processors using migrating helper threads (MK, SS, DMT), pp. 393–404.
CCCC-2011-GreweO #approach #clustering #using
A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
CCCC-2011-JenistaED #parallel #reachability #using
Using Disjoint Reachability for Parallelization (JCJ, YHE, BD), pp. 198–224.
CCCC-2011-NaeemL #alias #analysis #performance #set #summary #using
Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CGOCGO-2011-LiuM #analysis #locality #problem #using
Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGOCGO-2011-SanchezASPS #compilation #using
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
HPCAHPCA-2011-CarreteroVARMG #hardware #process #using
Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
HPCAHPCA-2011-GhasemiDK #architecture #using
Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors (HRG, SCD, NSK), pp. 38–49.
HPCAHPCA-2011-ManikantanRG #distance #manycore #named #performance
NUcache: An efficient multicore cache organization based on Next-Use distance (RM, KR, RG), pp. 243–253.
HPCAHPCA-2011-MehraraHSM #javascript #parallel #using
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism (MM, PCH, MS, SAM), pp. 87–98.
HPCAHPCA-2011-PellauerAKPE #manycore #named #simulation #using
HAsim: FPGA-based high-detail multicore simulation using time-division multiplexing (MP, MA, MAK, AP, JSE), pp. 406–417.
HPDCHPDC-2011-BalkirFR #architecture #distributed #mining #pipes and filters #using
A distributed look-up architecture for text mining applications using mapreduce (ASB, ITF, AR), pp. 279–280.
HPDCHPDC-2011-HudsonNRWJP #case study #data-driven #experience #simulation #using
Experiences using smaash to manage data-intensive simulations (RH, JN, LBR, KW, GCJI, MEP), pp. 205–216.
HPDCHPDC-2011-WolinskyF #case study #distributed #experience #grid #self #using
Experiences with self-organizing, decentralized grids using the grid appliance (DIW, RJOF), pp. 183–194.
HPDCHPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code #using
Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
LCTESLCTES-2011-NavabpourBF #debugging #testing #using
Software debugging and testing using the abstract diagnosis theory (SN, BB, SF), pp. 111–120.
SOSPSOSP-2011-VeeraraghavanCFN #detection #using
Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
CADECADE-2011-SchneiderS #automation #first-order #ontology #owl #proving #reasoning #theorem proving #using
Reasoning in the OWL 2 Full Ontology Language Using First-Order Automated Theorem Proving (MS, GS), pp. 461–475.
CAVCAV-2011-DudkaPV #data type #logic #named #using
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic (KD, PP, TV), pp. 372–378.
CAVCAV-2011-Jhala #using #verification
Using Types for Software Verification (RJ), p. 20.
CAVCAV-2011-JhalaMR #functional #named #source code #using #verification
HMC: Verifying Functional Programs Using Abstract Interpreters (RJ, RM, AR), pp. 470–485.
CAVCAV-2011-RamanK #behaviour #specification #using
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
CAVCAV-2011-SharmaDDA #generative #invariant #using
Simplifying Loop Invariant Generation Using Splitter Predicates (RS, ID, TD, AA), pp. 703–719.
CAVCAV-2011-SinghalA #simulation #using #verification
Using Coverage to Deploy Formal Verification in a Simulation World (VS, PA), pp. 44–49.
ICLPICLP-2011-ChishamPSW #logic programming #named #repository #using #web #web service
CDAOStore: A Phylogenetic Repository Using Logic Programming and Web Services (BC, EP, TCS, BW), pp. 209–219.
ICLPICLP-2011-NicholsonSS #generative #logic #music #probability #using
Improving the Outcome of a Probabilistic Logic Music System Generator by Using Perlin Noise (CJN, DDS, JS), pp. 231–239.
ICLPICLP-2011-OstrowskiFSA #evolution #ontology #using
Evolution of Ontologies using ASP (MO, GF, TS, GA), pp. 16–27.
ICLPICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination #using
SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLPICLP-J-2011-CorapiRVPS #design #induction #learning #using
Normative design using inductive learning (DC, AR, MDV, JAP, KS), pp. 783–799.
ICLPICLP-J-2011-DurzinskyMOSW #automation #network #re-engineering #using
Automatic network reconstruction using ASP (MD, WM, MO, TS, AW), pp. 749–766.
ICSTICST-2011-ChenCZXF #clustering #testing #using
Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
ICSTICST-2011-HeamN #data type #generative #named #random #recursion #testing
Seed: An Easy-to-Use Random Generator of Recursive Data Structures for Testing (PCH, CN), pp. 60–69.
ICSTICST-2011-KhalekK #constraints #database #relational #testing #theorem proving #using
Systematic Testing of Database Engines Using a Relational Constraint Solver (SAK, SK), pp. 50–59.
ICSTICST-2011-MalikSK #constraints #data type #debugging #using
Constraint-Based Program Debugging Using Data Structure Repair (MZM, JHS, SK), pp. 190–199.
ICSTICST-2011-Nica #on the #testing #using
On the Improvement of the Mutation Score Using Distinguishing Test Cases (SN), pp. 423–426.
ICSTICST-2011-SmithW #detection #heuristic #sql #using #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICSTICST-2011-YuSSR #embedded #testing #using
Using Property-Based Oracles when Testing Embedded System Applications (TY, AS, WSa, GR), pp. 100–109.
ICTSSICTSS-2011-MammarCJMO #c #detection #source code #testing #using
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-MeinkeN #term rewriting #testing #using
Learning-Based Testing for Reactive Systems Using Term Rewriting Technology (KM, FN), pp. 97–114.
ICTSSICTSS-2011-SchwarzlAW #composition #random testing #testing #using
Compositional Random Testing Using Extended Symbolic Transition Systems (CS, BKA, FW), pp. 179–194.
ISSTAISSTA-2011-GuoE #automation #data analysis #persistent #using
Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
ISSTAISSTA-2011-NaminK #testing
The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
ISSTAISSTA-2011-SegallTF #combinator #design #diagrams #using
Using binary decision diagrams for combinatorial test design (IS, RTB, EF), pp. 254–264.
RTARTA-2011-FalkeKS #analysis #c #compilation #source code #termination #using
Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
RTARTA-2011-KochemsO #analysis #functional #linear #reachability #using
Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
ICSTSAT-2011-BennettS #principle #using
Model Counting Using the Inclusion-Exclusion Principle (HB, SS), pp. 362–363.
ICSTSAT-2011-GableskeH #named #random #satisfiability #using
EagleUP: Solving Random 3-SAT Using SLS with Unit Propagation (OG, MH), pp. 367–368.
TAPTAP-2011-HeamM #approach #automaton #random testing #testing #using
A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
VMCAIVMCAI-2011-ChengRKB #embedded #fault tolerance #game studies #synthesis #theory and practice #using
Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice (CHC, HR, AK, CB), pp. 118–133.
CBSECBSE-2010-AllierSSV #component #consistency #execution #object-oriented #using
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces (SA, HAS, SS, SV), pp. 216–231.
CBSECBSE-2010-EichbergKMM #component #composition #feature model #modelling #using
Component Composition Using Feature Models (ME, KK, RM, MM), pp. 200–215.
ECSAECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality #using
Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
ECSAECSA-2010-ElorantaK #architecture #evaluation #using
Using Domain Knowledge to Boost Software Architecture Evaluation (VPE, KK), pp. 319–326.
ECSAECSA-2010-PerezDGA #agile #architecture #flexibility #using
Flexible Working Architectures: Agile Architecting Using PPCs (JP, JD, JG, PPA), pp. 102–117.
QoSAQoSA-2010-ChauvelSCHM #adaptation #architecture #self #using
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation (FC, HS, XC, GH, HM), pp. 102–118.
ASEASE-2010-KamalrudinGH #case study #requirements #tool support
Tool support for essential use cases to better capture software requirements (MK, JCG, JGH), pp. 255–264.
ASEASE-2010-KimYS #debugging #memory management #model checking #named #using
JRF-E: using model checking to give advice on eliminating memory model-related bugs (KK, TYK, BAS), pp. 215–224.
ASEASE-2010-KocaguneliGMYK #estimation
When to use data from other projects for effort estimation (EK, GG, TM, YY, JWK), pp. 321–324.
ASEASE-2010-NgocO #fault #using
Checking roundoff errors using counterexample-guided narrowing (DTBN, MO), pp. 301–304.
ASEASE-2010-RatanotayanonCS #feature model #transitive #using
Using transitive changesets to support feature location (SR, HJC, SES), pp. 341–344.
ASEASE-2010-ShangAH #case study #experience #mining #pipes and filters #repository #scalability #tool support #using
An experience report on scaling tools for mining software repositories using MapReduce (WS, BA, AEH), pp. 275–284.
ASEASE-2010-TrezentosLO #dependence #named #optimisation #problem #pseudo #using
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization (PT, IL, ALO), pp. 427–436.
CASECASE-2010-AnandFLM #distributed #implementation #network #using
A practical implementation of distributed system control over an asynchronous Ethernet network using time stamped data (DMA, JGF, YSLB, JRM), pp. 515–520.
CASECASE-2010-AngererPA #configuration management #mobile #named #using
MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots (SA, RP, RA), pp. 822–827.
CASECASE-2010-CabasinoGS #fault #petri net #using
Diagnosis using labeled Petri nets: Faults may either be silent or undistinguishable events (MPC, AG, CS), pp. 485–490.
CASECASE-2010-DhupatiKRR #analysis #detection #novel #speech #using #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-FrohlichS #automation #constraints #matrix #modelling #problem #scheduling #using
Relation matrices for automated MILP modeling of scheduling problems using temporal constraints (RF, SCS), pp. 69–74.
CASECASE-2010-GujarathiM #generative #integration #using
Generative CAD and CAE integration using common data model (GPG, YM), pp. 586–591.
CASECASE-2010-HuSF #analysis #biology #using
Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASECASE-2010-IshiiONTOTM #analysis #image #using
Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASECASE-2010-JohnsonM #optimisation #using
Local planning using switching time optimization (ERJ, TDM), pp. 828–834.
CASECASE-2010-Kanamori #design #using
Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
CASECASE-2010-KwokHFRW #approach #image #using
Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
CASECASE-2010-LeBSK #modelling #realtime #towards #using
Towards virtual instruments for cardiovascular healthcare: Real-time modeling of cardiovascular dynamics using ECG signals (TQL, STSB, AS, RK), pp. 903–910.
CASECASE-2010-MaruyamaKHTA #using
Nanomanipulation of single virus using Dielectrophoretic concentration on a microfluidic chip (HM, KK, AH, TT, FA), pp. 710–715.
CASECASE-2010-MikosFBF #design #development #distributed #ontology #reuse #using
Development of a system for distributed sharing and reuse of design and manufacturing knowledge in the PFMEA domain using a description logics-based ontology (WLM, JCEF, PEAB, LSF), pp. 598–603.
CASECASE-2010-PaullGLM #adaptation #using
An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
CASECASE-2010-RososhanskyXL #automation #using
Coverage based tool path planning for automated polishing using contact stress theory (MR, FX, YL), pp. 592–597.
CASECASE-2010-SunCL #algorithm #scheduling #using
Scheduling of steel-making and continuous casting system using the surrogate subgradient algorithm for lagrangian relaxation (LS, TC, PBL), pp. 885–890.
CASECASE-2010-WangL #3d #hybrid
Hybrid impedance control of a 3-DOF robotic arm used for rehabilitation treatment (JW, YL), pp. 768–773.
DACDAC-2010-Ababei #design #modelling #network #optimisation #using
Network on chip design and optimization using specialized influence models (CA), pp. 625–626.
DACDAC-2010-CallegariDWA #classification #learning #using
Classification rule learning using subgroup discovery of cross-domain attributes responsible for design-silicon mismatch (NC, DGD, LCW, MSA), pp. 374–379.
DACDAC-2010-ChoRXP #network #using
History-based VLSI legalization using network flow (MC, HR, HX, RP), pp. 286–291.
DACDAC-2010-ConstantinidesA #debugging #testing #using
Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
DACDAC-2010-DadgourHSB #analysis #design #energy #logic #using
Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DACDAC-2010-DhimanMR #modelling #online #predict #using
A system for online power prediction in virtualized environments using Gaussian mixture models (GD, KM, TR), pp. 807–812.
DACDAC-2010-LiangM #reuse #using
Instruction cache locking using temporal reuse profile (YL, TM), pp. 344–349.
DACDAC-2010-ParkBWM #debugging #graph #locality #named #using
BLoG: post-silicon bug localization in processors using bug localization graphs (SBP, AB, HW, SM), pp. 368–373.
DACDAC-2010-PigorschS #preprocessor #satisfiability #using
An AIG-Based QBF-solver using SAT for preprocessing (FP, CS), pp. 170–175.
DACDAC-2010-Potkonjak #synthesis #tool support #using
Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
DACDAC-2010-WangM #approximate #named #realtime #scalability #using
PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme (WW, PM), pp. 705–710.
DATEDATE-2010-AndalamRG #multi #predict #thread #using
Deterministic, predictable and light-weight multithreading using PRET-C (SA, PSR, AG), pp. 1653–1656.
DATEDATE-2010-ArtiagaC #metadata #using
Using filesystem virtualization to avoid metadata bottlenecks (EA, TC), pp. 562–567.
DATEDATE-2010-Aue #internet #mobile #power management #using
Low power mobile internet devices using LTE technology (VA), p. 794.
DATEDATE-2010-BanerjeeASNO #design
A methodology for propagating design tolerances to shape tolerances for use in manufacturing (SB, KBA, CNS, SRN, MO), pp. 1273–1278.
DATEDATE-2010-BarrioMMHM #functional #synthesis #using
Using Speculative Functional Units in high level synthesis (AADB, MCM, JMM, RH, SOM), pp. 1779–1784.
DATEDATE-2010-BolteSBNB #using
Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATEDATE-2010-ChenABF #monitoring #using
Non-invasive blood oxygen saturation monitoring for neonates using reflectance pulse oximeter (WC, IA, SBO, LMGF), pp. 1530–1535.
DATEDATE-2010-ChengDMMRWRA #parametricity #using
Capturing intrinsic parameter fluctuations using the PSP compact model (BC, DD, NM, CM, GR, XW, SR, AA), pp. 650–653.
DATEDATE-2010-ChenLJC #distributed #manycore #memory management #using
Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller (XC, ZL, AJ, SC), pp. 39–44.
DATEDATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters #using
Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATEDATE-2010-DammMHG #modelling #network #simulation #transaction #using
Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
DATEDATE-2010-DietrichEH #analysis #statistics #using
Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATEDATE-2010-El-MoselhyD #order #reduction #statistics #using
Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
DATEDATE-2010-GaoH #geometry #optimisation #programming #using
A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATEDATE-2010-GiraldoMJM #hardware #using
A HMMER hardware accelerator using divergences (JFEG, NM, RPJ, ACMAdM), pp. 405–410.
DATEDATE-2010-HatamiP #analysis #component #library #performance #representation #robust #using
Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATEDATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics #using
Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATEDATE-2010-KarnerASW #network #runtime #simulation #using
Holistic simulation of FlexRay networks by using run-time model switching (MK, EA, CS, RW), pp. 544–549.
DATEDATE-2010-KlemmF #c++ #embedded #metaprogramming #using
Bitstream processing for embedded systems using C++ metaprogramming (RK, GF), pp. 909–913.
DATEDATE-2010-LarsenLNP #analysis #realtime #synthesis #using
Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATEDATE-2010-MishraJ #optimisation #power management #synthesis #using
Low-power FinFET circuit synthesis using surface orientation optimization (PM, NKJ), pp. 311–314.
DATEDATE-2010-PomeranzR #requirements #sequence #testing #using
Reducing the storage requirements of a test sequence by using a background vector (IP, SMR), pp. 1237–1242.
DATEDATE-2010-ShafiqueMH #adaptation #complexity #reduction #using #video
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusion (MS, BM, JH), pp. 1713–1718.
DATEDATE-2010-SoekenWKGD #modelling #ocl #satisfiability #uml #using #verification
Verifying UML/OCL models using Boolean satisfiability (MS, RW, MK, MG, RD), pp. 1341–1344.
DATEDATE-2010-TajalliL #design #framework #power management #using
Ultra-low power mixed-signal design platform using subthreshold source-coupled circuits (AT, YL), pp. 711–716.
DATEDATE-2010-VadlamaniZBT #adaptation #composition #fault #manycore #using
Multicore soft error rate stabilization using adaptive dual modular redundancy (RV, JZ, WPB, RT), pp. 27–32.
DATEDATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis #using
GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
DATEDATE-2010-ZengC #metric #using
Interconnect delay and slew metrics using the beta distribution (JKZ, CPC), pp. 1329–1332.
DATEDATE-2010-ZhangLL #approach #markov #modelling #simulation #using #verification
An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
DocEngDocEng-2010-BeaudouxBJ #authoring #modelling #using
Using model driven engineering technologies for building authoring applications (OB, AB, JMJ), pp. 279–282.
DocEngDocEng-2010-KarolHHA #documentation #feature model #modelling #product line #using
Using feature models for creating families of documents (SK, MH, FH, UA), pp. 259–262.
DocEngDocEng-2010-NamaneSM #feature model #matrix #recognition #using
Degraded dot matrix character recognition using CSM-based feature extraction (AN, EHS, PM), pp. 207–210.
DocEngDocEng-2010-OllisBB #documentation #using
Optimized reprocessing of documents using stored processor state (JAO, DFB, SRB), pp. 135–138.
DocEngDocEng-2010-SojkaH #documentation #library #optimisation #using
Document engineering for a digital library: PDF recompression using JBIG2 and other optimizations of PDF documents (PS, RH), pp. 3–12.
DocEngDocEng-2010-ThaoM #data type #detection #using #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRRDRR-2010-BallKSN #analysis #documentation #using
Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
DRRDRR-2010-BianneKL #clustering #modelling #recognition #using #word
Context-dependent HMM modeling using tree-based clustering for the recognition of handwritten words (ALB, CK, LLS), pp. 1–10.
DRRDRR-2010-ChazalonC #definite clause grammar #documentation #using
Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
DRRDRR-2010-ChenMT #automation #performance #using #validation #word
Efficient automatic OCR word validation using word partial format derivation and language model (SC, DM, GRT), pp. 1–10.
DRRDRR-2010-PeredaT #precise #semiparsing #using
Date of birth extraction using precise shallow parsing (RP, KT), pp. 1–10.
DRRDRR-2010-YouADRGT #image #multimodal #retrieval #using
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
HTHT-2010-ChoudhuryFAGLY #automation #social #using
Automatic construction of travel itineraries using social breadcrumbs (MDC, MF, SAY, NG, RL, CY), pp. 35–44.
HTHT-2010-FossC #adaptation #authoring #generative #hypermedia #tool support #using
The next generation authoring adaptive hypermedia: using and evaluating the MOT3.0 and PEAL tools (JGKF, AIC), pp. 83–92.
HTHT-2010-GasslerZTS #named #recommendation #using
SnoopyDB: narrowing the gap between structured and unstructured information using recommendations (WG, EZ, MT, GS), pp. 271–272.
PODSPODS-2010-ReS #comprehension #estimation #using
Understanding cardinality estimation using entropy maximization (CR, DS), pp. 53–64.
SIGMODSIGMOD-2010-BaoDKR #using #workflow
An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
SIGMODSIGMOD-2010-GatterbauerS #trust #using
Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
SIGMODSIGMOD-2010-JinYW #classification #graph #named #using
GAIA: graph classification using evolutionary computation (NJ, CY, WW), pp. 879–890.
SIGMODSIGMOD-2010-ShindeGGD #locality #similarity #using
Similarity search and locality sensitive hashing using ternary content addressable memories (RS, AG, PG, DD), pp. 375–386.
SIGMODSIGMOD-2010-VernicaCL #parallel #performance #pipes and filters #using
Efficient parallel set-similarity joins using MapReduce (RV, MJC, CL), pp. 495–506.
SIGMODSIGMOD-2010-YangWLW #keyword #optimisation #using #web
Optimizing content freshness of relations extracted from the web using keyword search (MY, HW, LL, MW), pp. 819–830.
VLDBVLDB-2010-DyresonBM #using #xml
Using XMorph to Transform XML Data (CED, SSB, KM), pp. 1541–1544.
VLDBVLDB-2010-GolabKKS #quality #semantics #using
Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux (LG, HJK, FK, DS), pp. 1641–1644.
VLDBVLDB-2010-KazemitabarDAAS #query #sql #using
Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight (SJK, UD, MHA, AA, CS), pp. 1537–1540.
VLDBVLDB-2010-LimayeSC #using #web
Annotating and Searching Web Tables Using Entities, Types and Relationships (GL, SS, SC), pp. 1338–1347.
VLDBVLDB-2010-MiddelfartP #using
Using Sentinel Technology in the TARGIT BI Suite (MM, TBP), pp. 1629–1632.
VLDBVLDB-2010-TermehchyW #keyword #named #using #xml
EXTRUCT: Using Deep Structural Information in XML Keyword Search (AT, MW), pp. 1593–1596.
VLDBVLDB-2011-LeeH10 #clustering #named #performance #using
QSkycube: Efficient Skycube Computation using Point-Based Space Partitioning (JL, SwH), pp. 185–196.
CSEETCSEET-2010-LewHS #re-engineering #using
Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course (MWL, TBH, MS), pp. 121–128.
ITiCSEITiCSE-2010-AlaoutinenS #programming #self #student #taxonomy #using
Student self-assessment in a programming course using bloom’s revised taxonomy (SA, KS), pp. 155–159.
ITiCSEITiCSE-2010-AydinolG #using #web
Advantage of using web 2.0 applications in class (ABA, ÖG), p. 308.
ITiCSEITiCSE-2010-BasawapatnaKR #design #education #game studies #scalability #using
Using scalable game design to teach computer science from middle school to graduate school (ARB, KHK, AR), pp. 224–228.
ITiCSEITiCSE-2010-BasawapatnaR #feedback #how #physics #student #using
Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
ITiCSEITiCSE-2010-Crescenzi #using
Using AVs to explain NP-completeness (PC), p. 299.
ITiCSEITiCSE-2010-FinkelsteinPHDCB #game studies #named #network #social #student #using
SNAG: using social networking games to increase student retention in computer science (SLF, EP, AH, KD, SRC, TB), pp. 142–146.
ITiCSEITiCSE-2010-GarlickC #empirical #using
Using alice in CS1: a quantitative experiment (RG, ECC), pp. 165–168.
ITiCSEITiCSE-2010-GunawardenaTK #collaboration #using
Encouraging reading and collaboration using classroom salon (AG, AT, DK), pp. 254–258.
ITiCSEITiCSE-2010-HowardJN #behaviour #design #learning #online #using
Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition #using
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
ITiCSEITiCSE-2010-KyrilovCT #assessment #case study #education #evaluation #online #using
Improving CS education at Wits using an online assessment and evaluation system: a case study (AK, JC, MT), p. 314.
ITiCSEITiCSE-2010-Larraza-MendiluzeG #game studies #learning #process #topic #using
Changing the learning process of the input/output topic using a game in a portable console (ELM, NGV), p. 316.
ITiCSEITiCSE-2010-MarkhamK #case study #experience #using
Using personal robots in CS1: experiences, outcomes, and attitudinal influences (SM, KNK), pp. 204–208.
ITiCSEITiCSE-2010-MartinezLDC #case study #experience #re-engineering #using
Experiences in software engineering courses using psychometrics with RAMSET (LGM, GL, ARD, JRC), pp. 244–248.
FASEFASE-2010-DarvasM #consistency #proving #using
Proving Consistency and Completeness of Model Classes Using Theory Interpretation (ÁD, PM), pp. 218–232.
FoSSaCSFoSSaCS-2010-EggerMS #calculus #continuation
Linearly-Used Continuations in the Enriched Effect Calculus (JE, REM, AS), pp. 18–32.
TACASTACAS-2010-ParizekK #component #detection #fault #java #performance #random #using
Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-NadiHM #predict #set #using
Does the Past Say It All? Using History to Predict Change Sets in a CMDB (SN, RCH, SM), pp. 97–106.
CSMRCSMR-2010-OzkayaPGC #architecture #evolution #requirements #using
Using Architecturally Significant Requirements for Guiding System Evolution (IO, JADP, AG, SC), pp. 127–136.
CSMRCSMR-2010-Shrinivasan #migration #using
Data Migration from a Product to a Data Warehouse Using ETL Tool (CS), pp. 63–65.
ICPCICPC-2010-ChenR #case study #dependence #feature model #graph #using
Case Study of Feature Location Using Dependence Graph, after 10 Years (KC, VR), pp. 1–3.
ICPCICPC-2010-RevelleDP #data fusion #feature model #mining #using #web
Using Data Fusion and Web Mining to Support Feature Location in Software (MR, BD, DP), pp. 14–23.
ICPCICPC-2010-ScannielloDDD #algorithm #clustering #using
Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering (GS, AD, CD, TD), pp. 180–189.
ICSMEICSM-2010-AbdallahMG #robust #slicing #using
Certifying software robustness using program slicing (MA, MM, KG), pp. 1–2.
ICSMEICSM-2010-CanforaCCP #detection #empirical #logic #multi #using
Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSMEICSM-2010-DajsurenGM #legacy #using
Modernizing legacy software using a System Grokking technology (YD, MG, DM), pp. 1–7.
ICSMEICSM-2010-GethersP #modelling #object-oriented #relational #topic #using
Using Relational Topic Models to capture coupling among classes in object-oriented software systems (MG, DP), pp. 1–10.
ICSMEICSM-2010-HindleGH #process #using
Software process recovery using Recovered Unified Process Views (AH, MWG, RCH), pp. 1–10.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSMEICSM-2010-KameiMMMAH #debugging #modelling #predict #using
Revisiting common bug prediction findings using effort-aware models (YK, SM, AM, KiM, BA, AEH), pp. 1–10.
ICSMEICSM-2010-SaleckerG #graph #testing #using
Pairwise test set calculation using k-partite graphs (ES, SG), pp. 1–5.
ICSMEICSM-2010-SavageDGP #named #source code #topic #using
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
ICSMEICSM-2010-Wilson #concept #ontology #using
Using ontology fragments in concept location (LAW), pp. 1–2.
MSRMSR-2010-JuzgadoV #difference #re-engineering #using
Using differences among replications of software engineering experiments to gain knowledge (NJJ, SV).
MSRMSR-2010-PentaGA #approach #identification #using
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
SCAMSCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #programming #using
Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
SCAMSCAM-2010-ThomasAHB #evolution #modelling #topic #validation
Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
WCREWCRE-2010-BittencourtSGM #automation #information retrieval #modelling #using
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
WCREWCRE-2010-GratiSP #diagrams #execution #interactive #sequence chart #using #visualisation
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization (HG, HAS, PP), pp. 87–96.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCREWCRE-2010-SelimFZ #clone detection #detection #representation #using
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
PEPMPEPM-2010-Henglein #algebra #equivalence #lazy evaluation #optimisation #relational #using
Optimizing relational algebra operations using generic equivalence discriminators and lazy products (FH), pp. 73–82.
PEPMPEPM-2010-HofmannK #detection #morphism #problem #towards
I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDIPLDI-2010-BaekC #approximate #energy #framework #named #programming #using
Green: a framework for supporting energy-conscious programming using controlled approximation (WB, TMC), pp. 198–209.
PLDIPLDI-2010-WestbrookRIYAT #java #multi #named #programming #using
Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
PLDIPLDI-2010-XuR #detection
Detecting inefficiently-used containers to avoid bloat (G(X, AR), pp. 160–173.
SASSAS-2010-BrauerK #abstraction #automation #using
Automatic Abstraction for Intervals Using Boolean Formulae (JB, AK), pp. 167–183.
SASSAS-2010-Lesens #question #static analysis #using #why
Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
FLOPSFLOPS-2010-MorihataM #automation #parallel #quantifier #recursion #using
Automatic Parallelization of Recursive Functions Using Quantifier Elimination (AM, KM), pp. 321–336.
FLOPSFLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis #using
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
CIAACIAA-2010-Johnson #natural language #using
Uniformizing Rational Relations for Natural Language Applications Using Weighted Determinization (JHJ), pp. 173–180.
CIAACIAA-2010-Jonoska #automaton #self #using
Using Automata to Describe Self-Assembled Nanostructures (NJ), pp. 1–3.
CIAACIAA-2010-YuBI #automaton #multi #relational #string #using #verification
Relational String Verification Using Multi-track Automata (FY, TB, OHI), pp. 290–299.
DLTDLT-2010-Head #algebra #parallel #using
Using Light to Implement Parallel Boolean Algebra (TH), pp. 231–242.
ICALPICALP-v1-2010-BojanczykP #automaton #evaluation #nondeterminism #performance #using
Efficient Evaluation of Nondeterministic Automata Using Factorization Forests (MB, PP), pp. 515–526.
ICALPICALP-v2-2010-FontaineLV #algebra #approach #automaton #using
Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
LATALATA-2010-KasprzikK #learning #string #using
String Extension Learning Using Lattices (AK, TK), pp. 380–391.
LATALATA-2010-LetichevskySS #automaton #equivalence #finite #multi #problem #proving #using
The Equivalence Problem of Deterministic Multitape Finite Automata: A New Proof of Solvability Using a Multidimensional Tape (AAL, ASS, SKS), pp. 392–402.
LATALATA-2010-Penaloza #reasoning #standard #using
Using Sums-of-Products for Non-standard Reasoning (RP), pp. 488–499.
IFMIFM-2010-LanoR #model transformation #specification #uml #using #verification
Specification and Verification of Model Transformations Using UML-RSDS (KL, SKR), pp. 199–214.
SEFMSEFM-2010-GothelG #automation #invariant #network #realtime #towards #using #verification
Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants (TG, SG), pp. 310–314.
SEFMSEFM-2010-LindsayWY #assessment #behaviour #model checking #safety #using
Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
SEFMSEFM-2010-ScannielloRT #architecture #empirical #evaluation #semantics #using
Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation (GS, MR, GT), pp. 103–112.
SEFMSEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing #using
A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
ICFPICFP-2010-BradyH #domain-specific language #implementation #partial evaluation #using
Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation (EB, KH), pp. 297–308.
ICFPICFP-2010-Pop #case study #experience #haskell #python
Experience report: Haskell as a reagent: results and observations on the use of Haskell in a python project (IP), pp. 369–374.
ICFPICFP-2010-ScottSGM #functional #industrial #programming #using
Using functional programming within an industrial product group: perspectives and perceptions (DJS, RS, TG, AM), pp. 87–92.
IFLIFL-2010-BjornsonTG #f# #user interface #using
Composing Reactive GUIs in F# Using WebSharper (JB, AT, AG), pp. 203–216.
LISPILC-2010-YuasaY #low level #using #validation
Validating low-level instructions for fixnums using BDDs (SY, MY), pp. 11–20.
ICGTICGT-2010-Qayum #automation #graph transformation #refactoring #search-based #using
Automated Assistance for Search-Based Refactoring Using Unfolding of Graph Transformation Systems (FQ), pp. 407–409.
ICGTICGT-2010-SpicherMG #declarative #using
Declarative Mesh Subdivision Using Topological Rewriting in MGS (AS, OM, JLG), pp. 298–313.
ICGTICGT-2010-Zambon #abstraction #graph transformation #using #verification
Using Graph Transformations and Graph Abstractions for Software Verification (EZ), pp. 416–418.
CHICHI-2010-BatemanMGGMB #comprehension #visual notation
Useful junk?: the effects of visual embellishment on comprehension and memorability of charts (SB, RLM, CG, AG, DM, CAB), pp. 2573–2582.
CHICHI-2010-BillingsW #comprehension #online #using
Understanding dispute resolution online: using text to reflect personal and substantive issues in conflict (MB, LAW), pp. 1447–1456.
CHICHI-2010-BlomVSGAA #mobile #safety #security
Fear and the city: role of mobile services in harnessing safety and security in urban use contexts (JB, DV, MS, JG, KA, RA), pp. 1841–1850.
CHICHI-2010-ChangYM #testing #user interface #using
GUI testing using computer vision (THC, TY, RCM), pp. 1535–1544.
CHICHI-2010-ChevalierDBF #documentation #navigation #using
Using text animated transitions to support navigation in document histories (FC, PD, AB, JDF), pp. 683–692.
CHICHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering #using
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
CHICHI-2010-DixonPH #feedback #named #recognition #sketching #using
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces (DD, MP, TH), pp. 897–906.
CHICHI-2010-DruinFHGH #interface #keyword #using
Children’s roles using keyword search interfaces at home (AD, EF, HH, EG, LH), pp. 413–422.
CHICHI-2010-HeerB #crowdsourcing #design #using #visual notation #visualisation
Crowdsourcing graphical perception: using mechanical turk to assess visualization design (JH, MB), pp. 203–212.
CHICHI-2010-HogganB #interface #multimodal #named #testing
Crosstrainer: testing the use of multimodal interfaces in situ (EEH, SAB), pp. 333–342.
CHICHI-2010-HsiehKH #how #why
Why pay?: exploring how financial incentives are used for question & answer (GH, REK, SEH), pp. 305–314.
CHICHI-2010-HuhNS #comprehension #reuse
Finding the lost treasure: understanding reuse of used computing devices (JH, KN, NS), pp. 1875–1878.
CHICHI-2010-InglesantS #cost analysis #policy
The true cost of unusable password policies: password use in the wild (PI, MAS), pp. 383–392.
CHICHI-2010-LankST #documentation #fault #injection #using
Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
CHICHI-2010-McGookinRB #graph #interactive #using
Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
CHICHI-2010-Olmsted-HawalaMHA #comparison #protocol #testing #usability #web
Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability (ELOH, EDM, SH, KTA), pp. 2381–2390.
CHICHI-2010-SambasivanCTN #community
Intermediated technology use in developing communities (NS, EC, KT, BAN), pp. 2583–2592.
CHICHI-2010-SongGGF #interactive #mobile #named #using
MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector (HS, FG, TG, GWF), pp. 2451–2460.
CHICHI-2010-VertanenM #performance #speech #using
Speech dasher: fast writing using speech and gaze (KV, DJCM), pp. 595–598.
CHICHI-2010-Villamarin-SalomonB #behaviour #using
Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
CHICHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order #using
An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CHICHI-2010-WuDM #detection #enterprise #network #social #using
Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
CHICHI-2010-WycheSCAG #interactive
Deliberate interactions: characterizing technology use in Nairobi, Kenya (SW, TNS, MC, PMA, REG), pp. 2593–2602.
CHICHI-2010-YukselDTS #human-computer #interface #multi #novel #using
A novel brain-computer interface using a multi-touch surface (BFY, MD, JT, AS), pp. 855–858.
CHICHI-2010-ZhangQCW #case study #enterprise
A case study of micro-blogging in the enterprise: use, value, and related issues (JZ, YQ, JC, YW), pp. 123–132.
CSCWCSCW-2010-BurkeKW #communication #social
Social use of computer-mediated communication by adults on the autism spectrum (MB, RK, DW), pp. 425–434.
CSCWCSCW-2010-RobersonN #social
Survival needs and social inclusion: technology use among the homeless (JR, BAN), pp. 445–448.
CSCWCSCW-2010-TuckerBRW #named
Catchup: a useful application of time-travel in meetings (ST, OB, AR, SW), pp. 99–102.
SOFTVISSOFTVIS-2010-AdamoliH #analysis #framework #named #performance #visualisation
Trevis: a context tree visualization & analysis framework and its use for classifying performance failure reports (AA, MH), pp. 73–82.
SOFTVISSOFTVIS-2010-AnslowMNTB #evaluation #scalability #using #visualisation
User evaluation of polymetric views using a large visualization wall (CA, SM, JN, EDT, RB), pp. 25–34.
SOFTVISSOFTVIS-2010-LinTOB #comprehension #profiling #towards #using
Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
SOFTVISSOFTVIS-2010-TrumperBD #comprehension #parallel #thread #using #visualisation
Understanding complex multithreaded software systems by using trace visualization (JT, JB, JD), pp. 133–142.
SOFTVISSOFTVIS-2010-Zeckzer #layout #matrix #using #visualisation
Visualizing software entities using a matrix layout (DZ), pp. 207–208.
AdaEuropeAdaEurope-2010-AnderssonP #ada #algorithm #implementation #manycore #realtime #scheduling #using
Implementing Multicore Real-Time Scheduling Algorithms Based on Task Splitting Using Ada 2012 (BA, LMP), pp. 54–67.
AdaEuropeAdaEurope-2010-PastorASA #approach #modelling #realtime #sequence #towards #using
Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, ), pp. 167–180.
AdaEuropeAdaEurope-2010-White #ada #hardware #scheduling #using
Using Hardware Support for Scheduling with Ada (RW), pp. 125–138.
AdaSIGAda-2010-BradleyPZ #ada #development #realtime #using
Real-time system development in ada using LEGO® mindstorms® NXT (PJB, JAdlP, JZ), pp. 37–40.
AdaSIGAda-2010-JemliR #compilation #problem #static analysis #using
A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
AdaSIGAda-2010-Pettit #ada #concurrent #design #embedded #realtime #uml #using
Designing real-time, concurrent, and embedded software systems using UML and Ada (RGPI), pp. 7–8.
AdaSIGAda-2010-Rosen #object-oriented #reliability
Use of object oriented technologies in high reliability system (JPR), pp. 3–4.
CAiSECAiSE-2010-CastanoFM #semantics #using #variability #web
Dealing with Matching Variability of Semantic Web Data Using Contexts (SC, AF, SM), pp. 194–208.
CAiSECAiSE-2010-LagunaMC #case study #modelling #on the #question #semantics
On the Semantics of the Extend Relationship in Use Case Models: Open-Closed Principle or Clairvoyance? (MAL, JMM, YC), pp. 409–423.
CAiSECAiSE-2010-Paraszczak
The Influence of IT Systems on the Use of the Earth’s Resources (JRP), pp. 7–8.
CAiSECAiSE-2010-StalhaneSB #analysis #case study #diagrams #safety #sequence chart
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
EDOCEDOC-2010-AmarLCN #aspect-oriented #imperative #programming #using
Using Aspect-Oriented Programming to Trace Imperative Transformations (BA, HL, BC, CN), pp. 143–152.
EDOCEDOC-2010-EshuisN #framework #outsourcing #process #using
A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
EDOCEDOC-2010-QuartelSL #architecture #enterprise #modelling #requirements #using
IT Portfolio Valuation — Using Enterprise Architecture and Business Requirements Modeling (DACQ, MWAS, MML), pp. 3–13.
EDOCEDOC-2010-ZdravkovicI #approach #design #framework #modelling #ontology #using
A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
ICEISICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance #using
Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEISICEIS-AIDSS-2010-FariaGSMM #automation #natural language #ontology #using
Using Natural Language Processing for Automatic Extraction of Ontology Instances (CGdF, RG, IS, MM, DM), pp. 278–283.
ICEISICEIS-AIDSS-2010-GerberKM #formal method #metamodelling #ontology #towards #using
Towards the Formalisation of the TOGAF Content Metamodel using Ontologies (AG, PK, AvdM), pp. 54–64.
ICEISICEIS-AIDSS-2010-GilS #implementation #performance #process #using
Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICEISICEIS-AIDSS-2010-HaasMSD #information management #named #using
ConTask — Using Context-sensitive Assistance to Improve Task-oriented Knowledge Work (JH, HM, SS, AD), pp. 30–39.
ICEISICEIS-AIDSS-2010-MoriyasuYN #learning #self #using
Supervised Learning for Agent Positioning by using Self-organizing Map (KM, TY, HN), pp. 368–372.
ICEISICEIS-AIDSS-2010-SahaPMB #classification #clustering #difference #image #using
Improvement of Differential Crisp Clustering using ANN Classifier for Unsupervised Pixel Classification of Satellite Image (IS, DP, UM, SB), pp. 21–29.
ICEISICEIS-AIDSS-2010-SalasPRR #identification #using
Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
ICEISICEIS-AIDSS-2010-TomeAC #architecture #enterprise #experience #named
TREEAD — A Tool that Enables the Re-use of Experience in Enterprise Architecture Description (PT, LA, EC), pp. 332–343.
ICEISICEIS-AIDSS-2010-VialeBGP #approach #modelling #process #scalability #sequence #using
Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
ICEISICEIS-DISI-2010-BarczynskiFBS #adaptation #concept #information management #modelling #named #using
AdaptIE — Using Domain Language Concept to Enable Domain Experts in Modeling of Information Extraction Plans (WMB, FF, FB, DS), pp. 249–256.
ICEISICEIS-DISI-2010-FerrucciGOS #development #using
Estimating Software Development Effort using Tabu Search (FF, CG, RO, FS), pp. 236–241.
ICEISICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability #using
Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
ICEISICEIS-DISI-2010-LemosCV #query #relational #sql #using #xml
Using SQL/XML for Efficiently Translating Queries over XML View of Relational Data (FCL, CC, VMPV), pp. 269–274.
ICEISICEIS-DISI-2010-PanZH #library #open source #query #retrieval #using
An Open Source Software based Library Catalogue System using Soundexing Retrieval and Query Caching (ZP, YZ, JH), pp. 182–189.
ICEISICEIS-DISI-2010-PopovicCJ #process #quality
Absorption of Information Provided by Business Intelligence Systems — The Effect of Information Quality on the Use of Information in Business Processes (AP, PSC, JJ), pp. 176–181.
ICEISICEIS-DISI-2010-SchusterJS #using #web
Finding and Classifying Product Relationships using Information from the Public Web (DS, TMJ, AS), pp. 300–309.
ICEISICEIS-DISI-2010-ZhangOCK #case study #data mining #education #mining #student
Use Data Mining to Improve Student Retention in Higher Education — A Case Study (YZ, SO, TC, HK), pp. 190–197.
ICEISICEIS-HCI-2010-AstolfiMSA #difference #enterprise #people #problem #using
Using Cultural Differences to Join People with Common Interests or Problems in Enterprise Environment (GA, VMAdM, MARS, JCA), pp. 192–197.
ICEISICEIS-HCI-2010-TranKVW #declarative #generative #modelling #user interface #using
Using Task and Data Models for user Interface Declarative Generation (VT, MK, JV, YW), pp. 155–160.
ICEISICEIS-ISAS-2010-GradlMWK #enterprise #modelling #network #process #using
Modeling ERP Business Processes using Layered Queueing Networks (SG, MM, HW, HK), pp. 255–260.
ICEISICEIS-J-2010-BottcherHM10a #using #xml
Using XML Schema Subtraction to Compress Electronic Payment Messages (SB, RH, CM), pp. 451–463.
ICEISICEIS-J-2010-Cruz-LaraOGBBC #chat #communication #interface #standard #using
A Chat Interface Using Standards for Communication and e-Learning in Virtual Worlds (SCL, TO, JG, NB, LB, JPC), pp. 541–554.
ICEISICEIS-J-2010-HernandesSF10a #collaboration #concept #ontology #taxonomy #using #visualisation
Using Visualization and a Collaborative Glossary to Support Ontology Conceptualization (EMH, DS, SF), pp. 90–103.
ICEISICEIS-J-2010-LopesVSS #using
Using Cases, Evidences and Context to Support Decision Making (ECL, VV, ACS, US), pp. 340–356.
ICEISICEIS-J-2010-UrbanoRO10a #metric #using
Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
ICEISICEIS-SAIC-2010-GoyalK #approach #automation #fuzzy #multi #set #using
Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
ICEISICEIS-SAIC-2010-Kristensen #abstraction #collaboration #message passing #using
Abstraction from Collaboration between Agents using Asynchronous Message-passing (BBK), pp. 86–92.
CIKMCIKM-2010-AjiWAG #analysis #modelling #using
Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKMCIKM-2010-BatalH #classification #predict #using
Constructing classification features using minimal predictive patterns (IB, MH), pp. 869–878.
CIKMCIKM-2010-BenderskyCS #feedback #pseudo #query #using
Structural annotation of search queries using pseudo-relevance feedback (MB, WBC, DAS), pp. 1537–1540.
CIKMCIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards #using
Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKMCIKM-2010-CartrightALM #approximate #modelling #performance #query #using
Fast query expansion using approximations of relevance models (MAC, JA, VL, AM), pp. 1573–1576.
CIKMCIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query #using
Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
CIKMCIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image #using
Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKMCIKM-2010-FengZXY #crawling #rank #using
Focused crawling using navigational rank (SF, LZ, YX, CY), pp. 1513–1516.
CIKMCIKM-2010-Grefenstette #semantics
Use of semantics in real life applications (GG), pp. 5–6.
CIKMCIKM-2010-GuptaGNM #query #using
Efficiently querying archived data using Hadoop (RG, HG, UN, MKM), pp. 1301–1304.
CIKMCIKM-2010-HarveyRC #modelling #ranking #social #topic #using
Ranking social bookmarks using topic models (MH, IR, MJC), pp. 1401–1404.
CIKMCIKM-2010-HuangSN #graph #query #refinement #using #word
Query model refinement using word graphs (YH, LS, JYN), pp. 1453–1456.
CIKMCIKM-2010-JindalLL #bibliography #using
Finding unusual review patterns using unexpected rules (NJ, BL, EPL), pp. 1549–1552.
CIKMCIKM-2010-KapteinSVK #ranking #using #wiki
Entity ranking using Wikipedia as a pivot (RK, PS, APdV, JK), pp. 69–78.
CIKMCIKM-2010-KohnckeB #category theory #documentation #using #wiki
Using Wikipedia categories for compact representations of chemical documents (BK, WTB), pp. 1809–1812.
CIKMCIKM-2010-KurashimaIIF #recommendation #using
Travel route recommendation using geotags in photo sharing sites (TK, TI, GI, KF), pp. 579–588.
CIKMCIKM-2010-LangMWL #concept #markov #random #using
Improved latent concept expansion using hierarchical markov random fields (HL, DM, BW, JTL), pp. 249–258.
CIKMCIKM-2010-LiLY #named #query #semantics #using
EntityEngine: answering entity-relationship queries using shallow semantics (XL, CL, CY), pp. 1925–1926.
CIKMCIKM-2010-LimNJLL #behaviour #bibliography #detection #rating #using
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-LiQKG #automation #constraints #model merging #using
Automatic schema merging using mapping constraints among incomplete sources (XL, CQ, DK, SG), pp. 299–308.
CIKMCIKM-2010-MoonLCLZC #feedback #learning #online #ranking #realtime #using
Online learning for recency search ranking using real-time user feedback (TM, LL, WC, CL, ZZ, YC), pp. 1501–1504.
CIKMCIKM-2010-NguyenYLF #case study #experience #learning #multi #ranking #using
Experiences with using SVM-based learning for multi-objective ranking (LTN, WGY, RL, OF), pp. 1917–1920.
CIKMCIKM-2010-PobleteBMB #graph #image #query #retrieval #semantic gap #using #web
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval (BP, BB, MM, JMB), pp. 1553–1556.
CIKMCIKM-2010-ShavittWW #peer-to-peer #recommendation #using
Building recommendation systems using peer-to-peer shared content (YS, EW, UW), pp. 1457–1460.
CIKMCIKM-2010-ShiN #dependence #using
Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
CIKMCIKM-2010-SotoudehA #detection #framework #induction #using
Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKMCIKM-2010-VijayalakshmiMMDRM #algorithm #search-based #using
Intelligent sales forecasting engine using genetic algorithms (MV, BM, RM, AD, RR, KM), pp. 1669–1672.
CIKMCIKM-2010-WangL #clustering #documentation #incremental #summary #using
Document update summarization using incremental hierarchical clustering (DW, TL), pp. 279–288.
CIKMCIKM-2010-WhiteBD #predict #using
Predicting short-term interests using activity-based search context (RWW, PNB, STD), pp. 1009–1018.
CIKMCIKM-2010-WoodLH #concept #image #using
Searching consumer image collections using web-based concept expansion (MDW, ACL, SH), pp. 679–688.
CIKMCIKM-2010-XueCS #analysis #modelling #using
Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKMCIKM-2010-XueHC #query #set #using
Improving verbose queries using subset distribution (XX, SH, WBC), pp. 1059–1068.
ECIRECIR-2010-AltingovdeAU #retrieval #using #xml
XML Retrieval Using Pruned Element-Index Files (ISA, DA, ÖU), pp. 306–318.
ECIRECIR-2010-AlyDHS #concept #modelling #retrieval #using
Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts (RA, ARD, DH, AFS), pp. 241–252.
ECIRECIR-2010-CoxZFH #approximate #correctness #query #using
Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (IJC, JZ, RF, LKH), pp. 265–280.
ECIRECIR-2010-GoharianFYM #peer-to-peer #query #using
Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ECIRECIR-2010-KabadjovSSPP #evaluation #summary #taxonomy #using
Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy (MAK, JS, RS, MP, BP), pp. 662–666.
ECIRECIR-2010-KarlgrenEST #identification
Between Bags and Trees — Constructional Patterns in Text Used for Attitude Identification (JK, GE, MS, OT), pp. 38–49.
ECIRECIR-2010-KimCLL #detection #effectiveness #image #named #sequence #using
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ECIRECIR-2010-RamanUBB #documentation #feedback #on the #pseudo #using
On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents (KR, RU, PB, AB), pp. 573–576.
ECIRECIR-2010-UdupaK #analysis #canonical #correlation #equivalence #using
Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ECIRECIR-2010-YangJX #enterprise #using
Using Weighted Tagging to Facilitate Enterprise Search (SY, JJ, YX), pp. 590–593.
ECIRECIR-2010-YinHL #information retrieval #ranking #using #wiki
Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia (XY, XH, ZL), pp. 495–507.
ECIRECIR-2010-ZucconA #documentation #probability #quantum #rank #ranking #using
Using the Quantum Probability Ranking Principle to Rank Interdependent Documents (GZ, LA), pp. 357–369.
ICMLICML-2010-BshoutyL #clustering #linear #using
Finding Planted Partitions in Nearly Linear Time using Arrested Spectral Clustering (NHB, PML), pp. 135–142.
ICMLICML-2010-Busa-FeketeK #performance #using
Fast boosting using adversarial bandits (RBF, BK), pp. 143–150.
ICMLICML-2010-CumminsN #named #recognition #using #visual notation
FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model (MJC, PMN), pp. 3–10.
ICMLICML-2010-DruckM #generative #learning #modelling #using
High-Performance Semi-Supervised Learning using Discriminatively Constrained Generative Models (GD, AM), pp. 319–326.
ICMLICML-2010-KokD #learning #logic #markov #network #using
Learning Markov Logic Networks Using Structural Motifs (SK, PMD), pp. 551–558.
ICMLICML-2010-LayB #classification #predict #using
Supervised Aggregation of Classifiers using Artificial Prediction Markets (NL, AB), pp. 591–598.
ICMLICML-2010-PetrikTPZ #approximate #feature model #linear #markov #process #source code #using
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes (MP, GT, RP, SZ), pp. 871–878.
ICMLICML-2010-Salakhutdinov #adaptation #learning #using
Learning Deep Boltzmann Machines using Adaptive MCMC (RS), pp. 943–950.
ICMLICML-2010-YuZ #coordination #using
Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPRICPR-2010-AdluruTWD #re-engineering #using
Improving Undersampled MRI Reconstruction Using Non-local Means (GA, TT, RTW, EVRDB), pp. 4000–4003.
ICPRICPR-2010-AliL #correlation #question #recognition
Are Correlation Filters Useful for Human Action Recognition? (SA, SL), pp. 2608–2611.
ICPRICPR-2010-Allili #retrieval #using
Wavelet-Based Texture Retrieval Using a Mixture of Generalized Gaussian Distributions (MSA), pp. 3143–3146.
ICPRICPR-2010-AlySTT #multi #recognition #robust #self #similarity #using
Robust Face Recognition Using Multiple Self-Organized Gabor Features and Local Similarity Matching (SKHA, AS, NT, RiT), pp. 2909–2912.
ICPRICPR-2010-AmanoK #predict #using
Appearance Control Using Projection with Model Predictive Control (TA, HK), pp. 2832–2835.
ICPRICPR-2010-AnYB #documentation #segmentation #using
Document Segmentation Using Pixel-Accurate Ground Truth (CA, DY, HSB), pp. 245–248.
ICPRICPR-2010-AriA #estimation #modelling #optimisation #using
Maximum Likelihood Estimation of Gaussian Mixture Models Using Particle Swarm Optimization (CA, SA), pp. 746–749.
ICPRICPR-2010-ArvanitopoulosBT #fault #linear #subclass #using
Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPRICPR-2010-AshrafSF #constraints #invariant #rank #recognition #using
View-Invariant Action Recognition Using Rank Constraint (NA, YS, HF), pp. 3611–3614.
ICPRICPR-2010-AslanAFRAX #3d #graph #segmentation #using
3D Vertebral Body Segmentation Using Shape Based Graph Cuts (MSA, AMA, AAF, HMR, BA, PX), pp. 3951–3954.
ICPRICPR-2010-AtmosukartoSH #3d #learning #programming #search-based
The Use of Genetic Programming for Learning 3D Craniofacial Shape Quantifications (IA, LGS, CH), pp. 2444–2447.
ICPRICPR-2010-AzarM #automation #image #network #sequence #using
Automated Tracking of the Carotid Artery in Ultrasound Image Sequences Using a Self Organizing Neural Network (JCA, HHM), pp. 2544–2547.
ICPRICPR-2010-BanimahdE #distance #image #segmentation #set #using
Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPRICPR-2010-BassiouK #clustering #distance #using #word
Word Clustering Using PLSA Enhanced with Long Distance Bigrams (NB, CK), pp. 4226–4229.
ICPRICPR-2010-BayramogluA #image #recognition #using
Shape Index SIFT: Range Image Recognition Using Local Features (NB, AAA), pp. 352–355.
ICPRICPR-2010-BaysalKD #using
Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPRICPR-2010-BenabbasLID #modelling #recognition #using
Action Recognition Using Direction Models of Motion (YB, AL, NI, CD), pp. 4295–4298.
ICPRICPR-2010-BicegoMMAF #2d #kernel #recognition #using
2D Shape Recognition Using Information Theoretic Kernels (MB, AFTM, VM, PMQA, MATF), pp. 25–28.
ICPRICPR-2010-BimboLMP #detection #geometry #using
Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPRICPR-2010-BouchrikaCNMT #detection #people #using
Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPRICPR-2010-BozkurtEEE #recognition #speech
Use of Line Spectral Frequencies for Emotion Recognition from Speech (EB, EE, ÇEE, ATE), pp. 3708–3711.
ICPRICPR-2010-BuloP #clustering #difference #probability #using
Probabilistic Clustering Using the Baum-Eagon Inequality (SRB, MP), pp. 1429–1432.
ICPRICPR-2010-CadavidA #automation #detection #modelling #using #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-CakirC #2d #feature model #image #using
Image Feature Extraction Using 2D Mel-Cepstrum (, AEÇ), pp. 674–677.
ICPRICPR-2010-CalderaraPC #people #similarity #statistics #using
Alignment-Based Similarity of People Trajectories Using Semi-directional Statistics (SC, AP, RC), pp. 4275–4278.
ICPRICPR-2010-CandamoGKG #detection #using
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPRICPR-2010-CaoZL #markov #random #using
Human Body Parts Tracking Using Sequential Markov Random Fields (XQC, JZ, ZQL), pp. 1759–1762.
ICPRICPR-2010-Carneiro #automation #case study #comparative #design #image
A Comparative Study on the Use of an Ensemble of Feature Extractors for the Automatic Design of Local Image Descriptors (GC), pp. 3356–3359.
ICPRICPR-2010-CeolinH #difference #gender #metric #using
Characterising Facial Gender Difference Using Fisher-Rao Metric (SC, ERH), pp. 4308–4311.
ICPRICPR-2010-ChenNW #estimation #multi #using
Actual Midline Estimation from Brain CT Scan Using Multiple Regions Shape Matching (WC, KN, KW), pp. 2552–2555.
ICPRICPR-2010-ChoiMLSBPF #3d #multi #re-engineering #using
3D Face Reconstruction Using a Single or Multiple Views (JC, GGM, YL, LS, ORPB, MP, TCF), pp. 3959–3962.
ICPRICPR-2010-ChoPPKKALL #hybrid #segmentation #using
Level-Set Segmentation of Brain Tumors Using a New Hybrid Speed Function (WC, JP, SYP, SHK, SWK, GA, MEL, GL), pp. 1545–1548.
ICPRICPR-2010-ChoudhuryM #standard #using
Color Constancy Using Standard Deviation of Color Channels (AC, GGM), pp. 1722–1726.
ICPRICPR-2010-ChowdhuryCGR #graph #using #video
Cell Tracking in Video Microscopy Using Bipartite Graph Matching (ASC, RC, MG, NR), pp. 2456–2459.
ICPRICPR-2010-CiompiPR #approach #random #using
A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPRICPR-2010-ColemanSG #architecture #feature model #using
Coarse Scale Feature Extraction Using the Spiral Architecture Structure (SAC, BWS, BG), pp. 2370–2373.
ICPRICPR-2010-CoutinhoFF #identification #parsing #using
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
ICPRICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition #using
A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
ICPRICPR-2010-DaubneyX #3d #image #refinement #using
Estimating 3D Human Pose from Single Images Using Iterative Refinement of the Prior (BD, XX), pp. 3440–3443.
ICPRICPR-2010-DehzangiMCL #classification #fuzzy #using
Framewise Phone Classification Using Weighted Fuzzy Classification Rules (OD, BM, EC, HL), pp. 4186–4189.
ICPRICPR-2010-DickinsonHA #multi #using #video
Segmenting Video Foreground Using a Multi-Class MRF (PD, AH, KA), pp. 1848–1851.
ICPRICPR-2010-DornaikaC #classification #detection #performance #using
Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPRICPR-2010-DuboisPM #adaptation #analysis #component #composition #using
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-EkbalSG #feature model #multi #optimisation #recognition #using
Feature Selection Using Multiobjective Optimization for Named Entity Recognition (AE, SS, CSG), pp. 1937–1940.
ICPRICPR-2010-EklundAOYK #communication #interface #realtime #using
A Brain Computer Interface for Communication Using Real-Time fMRI (AE, MTA, HO, AY, HK), pp. 3665–3669.
ICPRICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation #using
A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPRICPR-2010-ErdoganG #using
Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors (HE, EMG), pp. 4573–4576.
ICPRICPR-2010-ErgulA #classification #topic #using
Scene Classification Using Spatial Pyramid of Latent Topics (EE, NA), pp. 3603–3606.
ICPRICPR-2010-FischerKFB #documentation #modelling #using #word
HMM-based Word Spotting in Handwritten Documents Using Subword Models (AF, AK, VF, HB), pp. 3416–3419.
ICPRICPR-2010-FleckD #image #invariant #using
Using Local Affine Invariants to Improve Image Matching (DF, ZD), pp. 1844–1847.
ICPRICPR-2010-FornesELV #classification #using
Symbol Classification Using Dynamic Aligned Shape Descriptor (AF, SE, JL, EV), pp. 1957–1960.
ICPRICPR-2010-FouheySB #detection #image #multi #using
Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPRICPR-2010-FraundorferWP #locality #mobile #using #visual notation #word
Combining Monocular and Stereo Cues for Mobile Robot Localization Using Visual Words (FF, CW, MP), pp. 3927–3930.
ICPRICPR-2010-FujitaHSTS #detection #image #using
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GajsekSM #canonical #correlation #multi #recognition #using
Multi-modal Emotion Recognition Using Canonical Correlations and Acoustic Features (RG, VS, FM), pp. 4133–4136.
ICPRICPR-2010-GhaeminiaSS #adaptation #using
Adaptive Motion Model for Human Tracking Using Particle Filter (MHG, AHS, SBS), pp. 2073–2076.
ICPRICPR-2010-Gonzalez-RubioC #multi #on the #string
On the Use of Median String for Multi-source Translation (JGR, FC), pp. 4328–4331.
ICPRICPR-2010-GrazziniDS #image #multi #using
Multichannel Image Regularisation Using Anisotropic Geodesic Filtering (JG, SED, PS), pp. 2664–2667.
ICPRICPR-2010-GriptonL #kernel #semistructured data #using
Kernel Domain Description with Incomplete Data: Using Instance-Specific Margins to Avoid Imputation (AG, WL), pp. 2921–2924.
ICPRICPR-2010-GuoBC #approach #learning #using
Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
ICPRICPR-2010-GuoH #using
Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks (JMG, CSH), pp. 1373–1376.
ICPRICPR-2010-GuoM #detection #using
Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPRICPR-2010-GuoMR #database #performance #recognition #scalability #using
Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
ICPRICPR-2010-HaberdarS #detection #framework #mobile #refinement #using #video
Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPRICPR-2010-HafnerGLUVW #classification #image #using
Endoscopic Image Classification Using Edge-Based Features (MH, AG, ML, AU, AV, FW), pp. 2724–2727.
ICPRICPR-2010-HarirchiRMDG #algorithm #detection #using
Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPRICPR-2010-HassanAMHW #authentication #image #self #using
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPRICPR-2010-HassanCG #documentation #image #kernel #retrieval #using
Document Image Retrieval Using Feature Combination in Kernel Space (EH, SC, MG), pp. 2009–2012.
ICPRICPR-2010-HoriKY #generative #image #multi #sequence #using
Arbitrary Stereoscopic View Generation Using Multiple Omnidirectional Image Sequences (MH, MK, NY), pp. 286–289.
ICPRICPR-2010-Hotta #classification #using #visual notation #word
Scene Classification Using Local Co-occurrence Feature in Subspace Obtained by KPCA of Local Blob Visual Words (KH), pp. 4230–4233.
ICPRICPR-2010-HsinLLC #image #using
Image Inpainting Using Structure-Guided Priority Belief Propagation and Label Transformations (HFH, JJL, CSL, HYC), pp. 4492–4495.
ICPRICPR-2010-HuC #distance #retrieval #sketching #using #video
Motion-sketch Based Video Retrieval Using a Trellis Levenshtein Distance (RH, JPC), pp. 121–124.
ICPRICPR-2010-HuQHJT #recognition #using
Action Recognition Using Spatial-Temporal Context (QH, LQ, QH, SJ, QT), pp. 1521–1524.
ICPRICPR-2010-HuYLS #3d #locality #multi #novel #using
A Novel Facial Localization for Three-dimensional Face Using Multi-level Partition of Unity Implicits (YH, JY, WL, PS), pp. 682–685.
ICPRICPR-2010-IbrahimKKG #analysis #online #using #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-InoueSSF #feature model #modelling #using
High-Level Feature Extraction Using SIFT GMMs and Audio Models (NI, TS, KS, SF), pp. 3220–3223.
ICPRICPR-2010-IzadiS #automation #detection #image #segmentation #using
Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPRICPR-2010-JabidKC #classification #gender #using
Gender Classification Using Local Directional Pattern (LDP) (TJ, MHK, OC), pp. 2162–2165.
ICPRICPR-2010-JagerPCC #3d #analysis #using
Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPRICPR-2010-JakkojuKJ #classification #performance #using
Fast and Spatially-Smooth Terrain Classification Using Monocular Camera (CJ, KMK, CVJ), pp. 4060–4063.
ICPRICPR-2010-JammalamadakaJKM #matrix #using
Discriminative Basis Selection Using Non-negative Matrix Factorization (AJ, SJ, SK, BSM), pp. 1533–1536.
ICPRICPR-2010-JiaM #design #using
Classifying Textile Designs Using Bags of Shapes (WJ, SJM), pp. 294–297.
ICPRICPR-2010-Jiang #3d #re-engineering #using
3D Human Pose Reconstruction Using Millions of Exemplars (HJ), pp. 1674–1677.
ICPRICPR-2010-JiI #recognition #using
Using Moments on Spatiotemporal Plane for Facial Expression Recognition (YJ, KI), pp. 3806–3809.
ICPRICPR-2010-JoshiWL #semantics #using
Suggesting Songs for Media Creation Using Semantics (DJ, MDW, JL), pp. 3208–3211.
ICPRICPR-2010-KalafatlarY #3d #segmentation #using
3D Articulated Shape Segmentation Using Motion Information (EK, YY), pp. 3595–3598.
ICPRICPR-2010-KanetoNB #estimation #realtime #using
Real-Time User Position Estimation in Indoor Environments Using Digital Watermarking for Audio Signals (RK, YN, NB), pp. 97–100.
ICPRICPR-2010-KayaCC #design #using
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPRICPR-2010-KeustermansMVS #automation #identification #modelling #using
Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
ICPRICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self #using
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-KhwajaAG #invariant #recognition #representation #using
Illumination and Expression Invariant Recognition Using SSIM Based Sparse Representation (AAK, AA, RG), pp. 4028–4031.
ICPRICPR-2010-KimL #markov #monte carlo #optimisation #random #using
Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
ICPRICPR-2010-KimYOC #optimisation #using #video
Recovery Video Stabilization Using MRF-MAP Optimization (SWK, KMY, SO, JYC), pp. 2804–2807.
ICPRICPR-2010-KitaW #clustering #image #using
Binarization of Color Characters in Scene Images Using k-means Clustering and Support Vector Machines (KK, TW), pp. 3183–3186.
ICPRICPR-2010-KohGC #locality #robust #using
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPRICPR-2010-KootstraBK #segmentation #symmetry #using
Using Symmetry to Select Fixation Points for Segmentation (GK, NB, DK), pp. 3894–3897.
ICPRICPR-2010-KrauszB #recognition #using
Action Recognition in Videos Using Nonnegative Tensor Factorization (BK, CB), pp. 1763–1766.
ICPRICPR-2010-KrishnanS #detection #using
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPRICPR-2010-KryszczukHS #orthogonal #predict #using
Direct Printability Prediction in VLSI Using Features from Orthogonal Transforms (KK, PH, RS), pp. 2764–2767.
ICPRICPR-2010-KumarCCAPH #classification #complexity #using
Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPRICPR-2010-KumeTSY #estimation #image #parametricity #using #video
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy (HK, TT, TS, NY), pp. 3923–3926.
ICPRICPR-2010-KusakunniranWZL #multi #recognition #using
Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron (WK, QW, JZ, HL), pp. 2186–2189.
ICPRICPR-2010-LawalAM #abduction #classification #network #recognition #using
Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPRICPR-2010-LeeCL #algorithm #data-driven #graph #markov #monte carlo #using
A Graph Matching Algorithm Using Data-Driven Markov Chain Monte Carlo Sampling (JL, MC, KML), pp. 2816–2819.
ICPRICPR-2010-LeeHH #automation #gender #recognition #using
Automatic Gender Recognition Using Fusion of Facial Strips (PHL, JYH, YPH), pp. 1140–1143.
ICPRICPR-2010-LeeP #information retrieval #using
Tracking Hand Rotation and Grasping from an IR Camera Using Cylindrical Manifold Embedding (CSL, SWP), pp. 2612–2615.
ICPRICPR-2010-Lei #distance #using #verification
Combining the Likelihood and the Kullback-Leibler Distance in Estimating the Universal Background Model for Speaker Verification Using SVM (ZL), pp. 4553–4556.
ICPRICPR-2010-Liao #using
Region Description Using Extended Local Ternary Patterns (WHL), pp. 1003–1006.
ICPRICPR-2010-LiGW #adaptation #image #reduction #using
Adaptive Enhancement with Speckle Reduction for SAR Images Using Mirror-Extended Curvelet and PSO (YL, HG, QW), pp. 4520–4523.
ICPRICPR-2010-LiIK #recognition #robust #using #word
Robust Face Recognition Using Block-Based Bag of Words (ZL, JiI, MK), pp. 1285–1288.
ICPRICPR-2010-LiLD #learning #using
Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
ICPRICPR-2010-LinW #detection #framework #using
Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPRICPR-2010-LiuA #learning #semantics #using
Learning Scene Semantics Using Fiedler Embedding (JL, SA), pp. 3627–3630.
ICPRICPR-2010-LiuCLL #automation #locality #parametricity #using
A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPRICPR-2010-LiuLH #learning #multi #representation #using
Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPRICPR-2010-LiuR #using
Estimating Nonrigid Shape Deformation Using Moments (WL, ER), pp. 185–188.
ICPRICPR-2010-LiuS #similarity #using #visual notation
Visual Tracking Using Sparsity Induced Similarity (HL, FS), pp. 1702–1705.
ICPRICPR-2010-LiuWWY #adaptation #linear #using
Pan-Sharpening Using an Adaptive Linear Model (LL, YW, YW, HY), pp. 4512–4515.
ICPRICPR-2010-LiZ #using
One-Shot Scanning Using a Color Stripe Pattern (RL, HZ), pp. 1666–1669.
ICPRICPR-2010-LiZZ #detection #invariant #using
Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPRICPR-2010-LlobetCPA #finite #transducer #using
OCR Post-processing Using Weighted Finite-State Transducers (RL, JRCN, JCPC, JA), pp. 2021–2024.
ICPRICPR-2010-LutfYL #identification #using
Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
ICPRICPR-2010-LvBYD #using #verification #visual notation
Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPRICPR-2010-Machucho-CadenaB #3d #algebra #geometry #re-engineering #using
3D Reconstruction of Tumors for Applications in Laparoscopy Using Conformal Geometric Algebra (RMC, EBC), pp. 2532–2535.
ICPRICPR-2010-MalgireddyCSGM #framework #gesture #modelling #recognition #using
A Framework for Hand Gesture Recognition and Spotting Using Sub-gesture Modeling (MRM, JJC, SS, VG, DM), pp. 3780–3783.
ICPRICPR-2010-MansouriAT #using #video
MPEG-2 Video Watermarking Using Pattern Consideration (AM, AMA, FTA), pp. 2428–2431.
ICPRICPR-2010-MatsukawaK #recognition #using
Action Recognition Using Three-Way Cross-Correlations Feature of Local Moton Attributes (TM, TK), pp. 1731–1734.
ICPRICPR-2010-MaTW #analysis #random #using
Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPRICPR-2010-MehmoodN #detection #kernel #using
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPRICPR-2010-MonzoAAM #case study #comparative #locality #recognition #using
A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPRICPR-2010-MoriMY #recognition #using
Gait Recognition Using Period-Based Phase Synchronization for Low Frame-Rate Videos (AM, YM, YY), pp. 2194–2197.
ICPRICPR-2010-MoroTU #detection #using
Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPRICPR-2010-MozaffariBA #classification #gender #geometry #image #using
Gender Classification Using Single Frontal Image Per Person: Combination of Appearance and Geometric Based Features (SM, HB, RA), pp. 1192–1195.
ICPRICPR-2010-NacereddineTZH #image #retrieval #using
Shape-Based Image Retrieval Using a New Descriptor Based on the Radon and Wavelet Transforms (NN, ST, DZ, LH), pp. 1997–2000.
ICPRICPR-2010-NasonovK #performance #using
Fast Super-Resolution Using Weighted Median Filtering (AVN, ASK), pp. 2230–2233.
ICPRICPR-2010-NishidaKOH #algorithm #using #visual notation
Visual Tracking Algorithm Using Pixel-Pair Feature (KN, TK, YO, MH), pp. 1808–1811.
ICPRICPR-2010-NordbergZ #2d #geometry #image #multi #segmentation #using
Multibody Motion Segmentation Using the Geometry of 6 Points in 2D Images (KN, VZ), pp. 1783–1787.
ICPRICPR-2010-NymanHA #constraints #framework #multi #using
Multi-camera Platform Calibration Using Multi-linear Constraints (PN, AH, ), pp. 53–56.
ICPRICPR-2010-OhH #learning #process #using #video
Unsupervised Learning of Activities in Video Using Scene Context (SO, AH), pp. 3579–3582.
ICPRICPR-2010-OliverTLM #automation #segmentation #set #using
Automatic Diagnosis of Masses by Using Level set Segmentation and Shape Description (AO, AT, XL, JM), pp. 2528–2531.
ICPRICPR-2010-OzdemirA #classification #image #representation #using
Image Classification Using Subgraph Histogram Representation (, SA), pp. 1112–1115.
ICPRICPR-2010-PaivaJT #analysis #image #using
Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPRICPR-2010-PaivaT #detection #image #using
Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPRICPR-2010-PanMSHN #adaptation #estimation #using #video
A Dual Pass Video Stabilization System Using Iterative Motion Estimation and Adaptive Motion Smoothing (PP, AM, JS, YH, SN), pp. 2298–2301.
ICPRICPR-2010-PapalazarouRW #detection #estimation #image #multi #using
Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPRICPR-2010-PapariCP #detection #novel #using
Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPRICPR-2010-ParkKS #detection #markov #modelling #recognition #using #visual notation
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPRICPR-2010-PatrauceanGC #identification #invariant #using
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-PaulaOBS #recognition #using
Forest Species Recognition Using Color-Based Features (PLdP, LSO, AdSBJ, RS), pp. 4178–4181.
ICPRICPR-2010-PengSGS #classification #documentation #using
Text Separation from Mixed Documents Using a Tree-Structured Classifier (XP, SS, VG, RS), pp. 241–244.
ICPRICPR-2010-PengYZC #classification #segmentation #using
Retinal Blood Vessels Segmentation Using the Radial Projection and Supervised Classification (QP, XY, LZ, YmC), pp. 1489–1492.
ICPRICPR-2010-PhamTN #bound #segmentation #similarity #using
Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPRICPR-2010-PiroonratanaWUALC #identification #morphism #nondeterminism #ranking #symmetry #using
Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
ICPRICPR-2010-PlumptonKLJ #classification #linear #online #using
On-Line fMRI Data Classification Using Linear and Ensemble Classifiers (COP, LIK, DEJL, SJJ), pp. 4312–4315.
ICPRICPR-2010-PrumVO #online #recognition #using #word
On-Line Handwriting Word Recognition Using a Bi-character Model (SP, MV, JMO), pp. 2700–2703.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-QuelhasMC #3d #quantifier #using
3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter (PQ, AMM, ACC), pp. 2508–2511.
ICPRICPR-2010-QuWL #difference #image #recognition #using
Action Recognition Using Space-Time Shape Difference Images (HQ, LW, CL), pp. 3661–3664.
ICPRICPR-2010-RahtuSH #random #using
Compressing Sparse Feature Vectors Using Random Ortho-Projections (ER, MS, JH), pp. 1397–1400.
ICPRICPR-2010-RantosonSFM #3d #metric #using
Non Contact 3D Measurement Scheme for Transparent Objects Using UV Structured light (RR, CS, DF, FM), pp. 1646–1649.
ICPRICPR-2010-RaraAESF #re-engineering #recognition #using
Face Recognition at-a-Distance Using Texture, Dense- and Sparse-Stereo Reconstruction (HMR, AMA, SYE, TLS, AAF), pp. 1221–1224.
ICPRICPR-2010-ReckyL #detection #using
Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPRICPR-2010-RomeroTV #analysis #corpus #image
Computer Assisted Transcription of Text Images: Results on the GERMANA Corpus and Analysis of Improvements Needed for Practical Use (VR, AHT, EV), pp. 2017–2020.
ICPRICPR-2010-RoyM #using #video
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (AR, SM), pp. 4504–4507.
ICPRICPR-2010-RoySB #game studies #image #segmentation #using
Segmentation of Unideal Iris Images Using Game Theory (KR, CYS, PB), pp. 2844–2847.
ICPRICPR-2010-SadekAMS #automation #realtime #recognition #using
Real-Time Automatic Traffic Accident Recognition Using HFG (SS, AAH, BM, US), pp. 3348–3351.
ICPRICPR-2010-SagheerHNS #recognition #using #word
Holistic Urdu Handwritten Word Recognition Using Support Vector Machine (MWS, CLH, NN, CYS), pp. 1900–1903.
ICPRICPR-2010-SanromaAS #approach #graph #using
A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
ICPRICPR-2010-SantoshWL #using #visual notation
Using Spatial Relations for Graphical Symbol Description (KCS, LW, BL), pp. 2041–2044.
ICPRICPR-2010-SarginGMR #using
Object Tracking with Ratio Cycles Using Shape and Appearance Cues (MES, PG, BSM, KR), pp. 3649–3652.
ICPRICPR-2010-SatakeM #multi #using
Stereo-Based Multi-person Tracking Using Overlapping Silhouette Templates (JS, JM), pp. 4304–4307.
ICPRICPR-2010-ScharfenbergerCF #artificial reality #predict #using
Driver Body-Height Prediction for an Ergonomically Optimized Ingress Using a Single Omnidirectional Camera (CS, SC, GF), pp. 298–301.
ICPRICPR-2010-SenechalBP #automation #detection #using
Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPRICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition #using
Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPRICPR-2010-SeppkeDH #detection #energy #image #symmetry #using
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPRICPR-2010-SeppkeDHW #equation #multi #parametricity #performance #using
Fast Derivation of Soil Surface Roughness Parameters Using Multi-band SAR Imagery and the Integral Equation Model (BS, LSDF, JAH, FW), pp. 3931–3934.
ICPRICPR-2010-SfikasHN #analysis #clustering #multi #using
Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPRICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile #using
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPRICPR-2010-ShiSG #documentation #image #using
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile (ZS, SS, VG), pp. 1916–1919.
ICPRICPR-2010-ShobeirinejadG #classification #gender #using
Gender Classification Using Interlaced Derivative Patterns (AS, YG), pp. 1509–1512.
ICPRICPR-2010-SilveiraM #image #using
Boosting Alzheimer Disease Diagnosis Using PET Images (MS, JSM), pp. 2556–2559.
ICPRICPR-2010-Simsekli #automation #classification #music #using
Automatic Music Genre Classification Using Bass Lines (US), pp. 4137–4140.
ICPRICPR-2010-SirmacekU #detection #network #using
Road Network Extraction Using Edge Detection and Spatial Voting (BS, ), pp. 3113–3116.
ICPRICPR-2010-SmeetsFHVS #3d #approach #composition #invariant #modelling #recognition #using
Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
ICPRICPR-2010-SoldeaESU #approach #image #segmentation #using
Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, , AE, MGU, ZF, MC), pp. 2592–2595.
ICPRICPR-2010-SoltanaACA #adaptation #algorithm #search-based #using
Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
ICPRICPR-2010-SrikrishnanC #analysis #linear #using
Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPRICPR-2010-StarkWP #representation #speech #using
Single Channel Speech Separation Using Source-Filter Representation (MS, MW, FP), pp. 826–829.
ICPRICPR-2010-SteerAM #data fusion #recognition #using
Audio-Visual Data Fusion Using a Particle Filter in the Application of Face Recognition (MAS, AAH, BM), pp. 4392–4395.
ICPRICPR-2010-SulicPKK #distributed #random #reduction #using
Dimensionality Reduction for Distributed Vision Systems Using Random Projection (VS, JP, MK, SK), pp. 380–383.
ICPRICPR-2010-SultaniC #detection #using
Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPRICPR-2010-SuryanarayanSM #recognition #using
Dynamic Hand Pose Recognition Using Depth Data (PS, AS, DM), pp. 3105–3108.
ICPRICPR-2010-SuzukiIAT #algorithm #estimation #image #using
A Scale Estimation Algorithm Using Phase-Based Correspondence Matching for Electron Microscope Images (AS, KI, TA, RT), pp. 2420–2423.
ICPRICPR-2010-SzeptyckiACZGS #2d #composition #using
Partial Face Biometry Using Shape Decomposition on 2D Conformal Maps of Faces (PS, MA, LC, WZ, XDG, DS), pp. 1505–1508.
ICPRICPR-2010-TabiaCDV #3d #retrieval #using
3D-Shape Retrieval Using Curves and HMM (HT, OC, MD, JPV), pp. 3147–3150.
ICPRICPR-2010-Tagawa #eye tracking #modelling #statistics #using
Depth Perception Model Based on Fixational Eye Movements Using Bayesian Statistical Inference (NT), pp. 1662–1665.
ICPRICPR-2010-TangHLL #retrieval #using
A Person Retrieval Solution Using Finger Vein Patterns (DT, BH, RL, WL), pp. 1306–1309.
ICPRICPR-2010-TanveerI #approach #using
A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
ICPRICPR-2010-TaxHVP #clustering #concept #detection #learning #multi #using
The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPRICPR-2010-TekeT #image #multi #strict #using
Multi-spectral Satellite Image Registration Using Scale-Restricted SURF (MT, AT), pp. 2310–2313.
ICPRICPR-2010-ThiCZWS #modelling #recognition #using
Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPRICPR-2010-TorrentPLFSMP #approach #detection #using
Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPRICPR-2010-TrummerMD #online #optimisation #using
Online Next-Best-View Planning for Accuracy Optimization Using an Extended E-Criterion (MT, CM, JD), pp. 1642–1645.
ICPRICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability #using
Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPRICPR-2010-TumaIP #classification #kernel #set #using
Hydroacoustic Signal Classification Using Kernel Functions for Variable Feature Sets (MT, CI, MP), pp. 1011–1014.
ICPRICPR-2010-TurkerKG #classification #image #network #using
Classification of Polarimetric SAR Images Using Evolutionary RBF Networks (TI, SK, MG), pp. 4324–4327.
ICPRICPR-2010-UbukataTMU #multi #segmentation #using
Multi-object Segmentation in a Projection Plane Using Subtraction Stereo (TU, KT, AM, KU), pp. 3296–3299.
ICPRICPR-2010-Velasco-ForeroA #modelling #statistics #using
Statistical Shape Modeling Using Morphological Representations (SVF, JA), pp. 3537–3540.
ICPRICPR-2010-VenkateshaT #process #recognition #using
Human Activity Recognition Using Local Shape Descriptors (SV, MT), pp. 3704–3707.
ICPRICPR-2010-VenkateshJ #using
Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
ICPRICPR-2010-VenkateshKM #3d #approach #recognition #using
Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
ICPRICPR-2010-Wang #detection #documentation #recognition #using
Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPRICPR-2010-WangAYL #bottom-up #estimation #learning #top-down #using
Combined Top-Down/Bottom-Up Human Articulated Pose Estimation Using AdaBoost Learning (SW, HA, TY, SL), pp. 3670–3673.
ICPRICPR-2010-WangC10a #3d #estimation #using
Articulated Human Body: 3D Pose Estimation Using a Single Camera (ZW, RC), pp. 3768–3771.
ICPRICPR-2010-WangH #multi #random #recognition #using
Cancelable Face Recognition Using Random Multiplicative Transform (YW, DH), pp. 1261–1264.
ICPRICPR-2010-WangH10a #case study #classification #design #multi #prototype #using
A Study of Designing Compact Recognizers of Handwritten Chinese Characters Using Multiple-Prototype Based Classifiers (YW, QH), pp. 1872–1875.
ICPRICPR-2010-WangJMS #process #using
Decoding Finger Flexion from Electrocorticographic Signals Using a Sparse Gaussian Process (ZW, QJ, KJM, GS), pp. 3756–3759.
ICPRICPR-2010-WangLL #3d #linear #programming #using
Monocular 3D Tracking of Deformable Surfaces Using Linear Programming (CW, XL, YL), pp. 1710–1713.
ICPRICPR-2010-WangLS #documentation #identification #using
Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
ICPRICPR-2010-WangM #learning #order #process #using
Gaussian Process Learning from Order Relationships Using Expectation Propagation (RW, SJM), pp. 605–608.
ICPRICPR-2010-WangSLYB #classification #using
Shape Classification Using Tree -Unions (BW, WS, WL, XY, XB), pp. 983–986.
ICPRICPR-2010-WartakB #estimation #using
Optical Flow Estimation Using Diffusion Distances (SW, AGB), pp. 189–192.
ICPRICPR-2010-WatanabeNKI #estimation #using
Estimation of Non-rigid Surface Deformation Using Developable Surface Model (YW, TN, TK, MI), pp. 197–200.
ICPRICPR-2010-WijnhovenW #detection #performance #probability #using
Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPRICPR-2010-WuHCCT #detection #interactive #using #visual notation
Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPRICPR-2010-WuLW #image #learning #retrieval #using
Enhancing SVM Active Learning for Image Retrieval Using Semi-supervised Bias-Ensemble (JW, ML, CLW), pp. 3175–3178.
ICPRICPR-2010-XiaLH #mining #modelling #using
Mining Exemplars for Object Modelling Using Affinity Propagation (SX, JL, ERH), pp. 918–921.
ICPRICPR-2010-Xie #segmentation #set #using
Level Set Based Segmentation Using Local Feature Distribution (XX), pp. 2780–2783.
ICPRICPR-2010-XuHL10a #how #image #recognition #robust
Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination (LX, LH, CL), pp. 2692–2695.
ICPRICPR-2010-XuHW #similarity #using
Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding (WX, ERH, RCW), pp. 3324–3327.
ICPRICPR-2010-YaegashiY #kernel #learning #multi #recognition #using
Geotagged Photo Recognition Using Corresponding Aerial Photos with Multiple Kernel Learning (KY, KY), pp. 3272–3275.
ICPRICPR-2010-YamanakaSS #adaptation #image #using
Adaptive Image Projection onto Non-planar Screen Using Projector-Camera Systems (TY, FS, JS), pp. 307–310.
ICPRICPR-2010-YamauchiBS #3d #modelling #using
3D Human Body Modeling Using Range Data (KY, BB, HS), pp. 3476–3479.
ICPRICPR-2010-YangSZ #analysis #multi #recognition #using
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-YoonK #recognition #using
Human Action Recognition Using Segmented Skeletal Features (SMY, AK), pp. 3740–3743.
ICPRICPR-2010-ZareG #multi #pattern matching #pattern recognition #recognition #using
Pattern Recognition Using Functions of Multiple Instances (AZ, PDG), pp. 1092–1095.
ICPRICPR-2010-ZhangGC #detection #invariant #using
Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPRICPR-2010-ZhangHTW #3d #evaluation #framework #modelling #using
3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
ICPRICPR-2010-ZhangK10a #detection #graph #using
Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPRICPR-2010-ZhangSSQ #keyword #using
Improved Mandarin Keyword Spotting Using Confusion Garbage Model (SZ, ZS, QS, YQ), pp. 3700–3703.
ICPRICPR-2010-ZhangWB #classification #using
Age Classification Base on Gait Using HMM (DZ, YW, BB), pp. 3834–3837.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
ICPRICPR-2010-ZhangZZZ #classification #kernel #metric #using
Time Series Classification Using Support Vector Machine with Gaussian Elastic Metric Kernel (DZ, WZ, DZ, HZ), pp. 29–32.
ICPRICPR-2010-ZhouK #identification #image #locality #using
Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
ICPRICPR-2010-ZhouWH #2d #3d #realtime #using
Real-Time 3D Face and Facial Action Tracking Using Extended 2D+3D AAMs (MZ, YW, XH), pp. 3963–3966.
ICPRICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition #using
Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
ICPRICPR-2010-ZouH #3d #performance #using
Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
ICPRICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence #using
Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
KDDKDD-2010-AbeMPRJTBACKDG #learning #optimisation #using
Optimizing debt collections using constrained reinforcement learning (NA, PM, CP, CKR, DLJ, VPT, JJB, GFA, BRC, MK, MD, TG), pp. 75–84.
KDDKDD-2010-ChuaL #generative #modelling #network #online #rating #trust #using
Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KDDKDD-2010-LiuMTLL #learning #metric #optimisation #using
Semi-supervised sparse metric learning using alternating linearization optimization (WL, SM, DT, JL, PL), pp. 1139–1148.
KDDKDD-2010-MaxwellBR #graph #memory management #mining #using
Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
KDDKDD-2010-PrestonBKSF #clustering #constraints #using
Redefining class definitions using constraint-based clustering: an application to remote sensing of the earth’s surface (DP, CEB, RK, DSM, MAF), pp. 823–832.
KDDKDD-2010-RothBDFHLLMM #graph #social #using
Suggesting friends using the implicit social graph (MR, ABD, DD, GF, IH, AL, NL, YM, RM), pp. 233–242.
KDDKDD-2010-SatoN #modelling #process #topic #using
Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
KDDKDD-2010-YangO #feature model #predict #probability #using
Feature selection for support vector regression using probabilistic prediction (JBY, CJO), pp. 343–352.
KDDKDD-2010-YeLCJ #automation #categorisation #clustering #using
Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network #using
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KDIRKDIR-2010-BallesterosBG #dependence #parsing #using
Text Simplification using Dependency Parsing for Spanish (MB, SB, PG), pp. 330–335.
KDIRKDIR-2010-BallesterosHFG #dependence #parsing #using
Giving Shape to an N-version Dependency Parser — Improving Dependency Parsing Accuracy for Spanish using Maltparser (MB, JH, VF, PG), pp. 336–341.
KDIRKDIR-2010-CamposMO #random #recognition #using
Recognition of Gene/Protein Names using Conditional Random Fields (DC, SM, JLO), pp. 275–280.
KDIRKDIR-2010-Ghosh #locality #mining #modelling #multi #predict #scalability #using
Actionable Mining of Large, Multi-relational Data using Localized Predictive Models (JG), pp. 9–10.
KDIRKDIR-2010-HelouA #metric #multi #semantics #using
Semantic Measures based on Wordnet using Multiple Information Sources (MAH, AA), pp. 500–503.
KDIRKDIR-2010-JedrzejczakW #generative #query #using
Integrated Candidate Generation in Processing Batches of Frequent Itemset Queries using Apriori (PJ, MW), pp. 487–490.
KDIRKDIR-2010-KrainesGHMT #generative #using
Generating Literature-based Knowledge Discoveries in Life Sciences using Relationship Associations (SBK, WG, DH, HM, TT), pp. 35–44.
KDIRKDIR-2010-MautnerM #categorisation #comparison #documentation #network
Comparison of Neural Networks used for Processing and Categorization of Czech Written Documents (PM, RM), pp. 510–513.
KDIRKDIR-2010-MollerEDS #automation #ontology #recognition #using
Automatic Spatial Plausibility Checks for Medical Object Recognition Results using a Spatio-anatomical Ontology (MM, PE, AD, DS), pp. 5–13.
KDIRKDIR-2010-Studer #lightweight #modelling #process #semantics #using #web
Process-oriented Semantic Web Search — Using Lightweight Semantic Models for Supporting the Search Process (RS), p. 7.
KDIRKDIR-2010-TsengPF #classification #markov #using
The Typhoon Track Classification using Tri-plots and Markov Chain (JCHT, HKKP, CF), pp. 364–369.
KDIRKDIR-2010-ZhangUC #information management #using
A Comprehensive Solution to Procedural Knowledge Acquisition using Information Extraction (ZZ, VSU, FC), pp. 432–437.
KEODKEOD-2010-CasasCC #fibonacci #modelling #representation #specification #towards #using
Towards a Representation of Enviromental Models using Specification and Description Language — From the Fibonacci Model to a Wildfire Model (PFiC, MC, JC), pp. 343–346.
KEODKEOD-2010-ChatterjeeB #documentation #network #random #summary #using
Single Document Text Summarization using Random Indexing and Neural Networks (NC, AB), pp. 171–176.
KEODKEOD-2010-ChatterjeeKRD #automation #classification #email #ontology #using
Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
KEODKEOD-2010-EynardMM #analysis #on the #ontology
On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KEODKEOD-2010-KambhampatiSP #metric #predict
Dysphonia Measures in Parkinson’s Disease and Their use in Prediction of Its Progression (CK, MS, NP), pp. 104–109.
KEODKEOD-2010-KamelR #ontology #parallel #using
Ontology Building using Parallel Enumerative Structures (MK, BR), pp. 276–281.
KEODKEOD-2010-NairM #multi #network #using
Informledge System — A Modified Knowledge Network with Autonomous Nodes using Multi-lateral Links (TRGN, MM), pp. 351–354.
KEODKEOD-2010-TiwariAMK #mobile #using #web #web service
Dynamic Discovery of Web Services using Mobile Agents (GT, RA, SM, DSK), pp. 497–500.
KEODKEOD-2010-ValienteRV #modelling #owl #semantics #using
Defining the Semantics of It Service Management Models using OWL and SWRL (MCV, DR, CVC), pp. 378–381.
KEODKEOD-2010-YunSNYKK #framework #semantics #using #web #workflow
Improving the Workflow of Semantic Web Portals using M/R in Cloud Platform (SY, MS, HN, SKY, HK, HGK), pp. 485–488.
KEODKEOD-2010-ZakraouiZ #interactive #programming #set #using #web
Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
KMISKMIS-2010-BornerL #enterprise #using
Using Role-plays to Acquire Process-oriented Knowledge in Enterprises (RB, ML), pp. 149–156.
KMISKMIS-2010-BrockV #analysis #data flow #semantics #using
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation #using
Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMISKMIS-2010-DienstAHF #knowledge base #visual notation
Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
KMISKMIS-2010-LiDFF #behaviour #comprehension
Understanding Behavioral Intention of e-Learning System Re-use (YL, YD, ZF, WF), pp. 218–223.
KMISKMIS-2010-SrivastavaS #composition #game studies #using #validation
The Validation of a Dynamic Service Composition Model using a Simple Game (AS, PGS), pp. 260–266.
RecSysRecSys-2010-HannonBS #collaboration #recommendation #twitter #using
Recommending twitter users to follow using content and collaborative filtering approaches (JH, MB, BS), pp. 199–206.
RecSysRecSys-2010-LeeB #collaboration #process #recommendation #self #using
Using self-defined group activities for improvingrecommendations in collaborative tagging systems (DHL, PB), pp. 221–224.
RecSysRecSys-2010-VasukiNLD #network #recommendation #using
Affiliation recommendation using auxiliary networks (VV, NN, ZL, ISD), pp. 103–110.
SEKESEKE-2010-ArrudaCD #detection #framework #using
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-DingWT #aspect-oriented #case study #design
Designing Aspects with Use Cases: A Case Study (JD, CRW, MNHT), pp. 797–803.
SEKESEKE-2010-FagundesS #estimation #fault #using
Software Defect Estimation using Support Vector Regression (RAdAF, RMCRdS), pp. 265–268.
SEKESEKE-2010-JuniorLAMW #impact analysis #learning #multi #using
Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
SEKESEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering #using
Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
SEKESEKE-2010-KhounSiavashB #metric #ontology #semantics #using
Using the whole structure of ontology for semantic relatedness measurement (EK, ABD), pp. 79–83.
SEKESEKE-2010-MarcaciniR #clustering #incremental #topic #using
Incremental Construction of Topic Hierarchies using Hierarchical Term Clustering (RMM, SOR), p. 553.
SEKESEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification #using
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKESEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning #using
A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
SEKESEKE-2010-Radlinski #development #predict #quality #using
Software Development Effort and Quality Prediction Using Bayesian Nets and small Local Qualitative Data (LR), pp. 113–116.
SEKESEKE-2010-RodriguesVZ #automation #modelling #product line #testing #using
PLeTs-Test Automation using Software Product Lines and Model Based Testing (EdMR, LDV, AFZ), pp. 483–488.
SEKESEKE-2010-ShewchukG #experience #functional #maintenance #testing #user interface #using
Experience with Maintenance of a Functional GUI Test Suite using IBM Rational Functional Tester (YS, VG), pp. 489–494.
SEKESEKE-2010-SpinolaT #ubiquitous
Characteristics of Ubiquitous Software Projects: Pertinence, Relevance, and Use (ROS, GHT), pp. 732–737.
SEKESEKE-2010-VilaMF #adaptation #analysis #qvt #strict #using
Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKESEKE-2010-Wang #black box #parametricity #testing #using
Reducing Black-box Test Suite Using Input Parameter Relationships (LW), pp. 180–185.
SEKESEKE-2010-XuanJRYL #automation #classification #debugging #using
Automatic Bug Triage using Semi-Supervised Text Classification (JX, HJ, ZR, JY, ZL), pp. 209–214.
SIGIRSIGIR-2010-ChandarC #using
Diversification of search results using webgraphs (PC, BC), pp. 869–870.
SIGIRSIGIR-2010-ClementsSVR #behaviour #predict #using
Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
SIGIRSIGIR-2010-DuZYCC #query #recognition #using
Using search session context for named entity recognition in query (JD, ZZ, JY, YC, ZC), pp. 765–766.
SIGIRSIGIR-2010-GaoCWZ #learning #rank #using
Learning to rank only using training data from related domain (WG, PC, KFW, AZ), pp. 162–169.
SIGIRSIGIR-2010-GoharianM #classification #query #using
Context aware query classification using dynamic query window and relationship net (NG, SSRM), pp. 723–724.
SIGIRSIGIR-2010-KimC #documentation #multi #ranking #using
Ranking using multiple document types in desktop search (JK, WBC), pp. 50–57.
SIGIRSIGIR-2010-LeeLSR #precise #retrieval #sentiment #using
High precision opinion retrieval using sentiment-relevance flows (SWL, JTL, YIS, HCR), pp. 817–818.
SIGIRSIGIR-2010-LopesR #health #information retrieval #precise #using
Using local precision to compare search engines in consumer health information retrieval (CTL, CR), pp. 835–836.
SIGIRSIGIR-2010-MeijR #modelling #query #using #wiki
Supervised query modeling using wikipedia (EM, MdR), pp. 875–876.
SIGIRSIGIR-2010-MerhavMBYF #recognition #relational #using
Incorporating global information into named entity recognition systems using relational context (YM, FdSM, DB, WGY, OF), pp. 883–884.
SIGIRSIGIR-2010-MojdehC #consistency #learning #using
Semi-supervised spam filtering using aggressive consistency learning (MM, GVC), pp. 751–752.
SIGIRSIGIR-2010-RothK #modelling #retrieval #using
Cross-language retrieval using link-based language models (BR, DK), pp. 773–774.
SIGIRSIGIR-2010-ShtokKC #modelling #predict #statistics #using
Using statistical decision theory and relevance models for query-performance prediction (AS, OK, DC), pp. 259–266.
SIGIRSIGIR-2010-WhiteC
Exploring the use of labels to shortcut search trails (RWW, RC), pp. 811–812.
SIGIRSIGIR-2010-WooLLSR #ranking #retrieval #using
Achieving high accuracy retrieval using intra-document term ranking (HWW, JTL, SWL, YIS, HCR), pp. 885–886.
SIGIRSIGIR-2010-YiLWR #using #video
Contextual video advertising system using scene information inferred from video scripts (BJY, JTL, HWW, HCR), pp. 771–772.
SIGIRSIGIR-2010-YinHZL #approach #modelling #using #wiki
A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
SIGIRSIGIR-2010-ZhangWL #interactive #multi #named #summary #using #visualisation
VisualSum: an interactive multi-document summarization system using visualization (YZ, DW, TL), pp. 857–858.
ECMFAECMFA-2010-JohannesF #abstraction #composition #framework #modelling #network #reuse #using
Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework (JJ, MAF), pp. 132–143.
ECMFAECMFA-2010-KessentiniBSB #diagrams #heuristic #petri net #sequence chart #using
Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search (MK, AB, HAS, MB), pp. 156–172.
ECMFAECMFA-2010-YueBL #approach #automation #case study #diagrams #process
An Automated Approach to Transform Use Cases into Activity Diagrams (TY, LCB, YL), pp. 337–353.
MODELSMoDELS-v1-2010-KolovosRAPPB #emf #model transformation #using
Taming EMF and GMF Using Model Transformation (DSK, LMR, SbA, RFP, FACP, GB), pp. 211–225.
MODELSMoDELS-v1-2010-NoyritGTS #consistency #modelling #multi #uml #using
Consistent Modeling Using Multiple UML Profiles (FN, SG, FT, BS), pp. 392–406.
MODELSMoDELS-v2-2010-GerthKLE #detection #precise #process #using
Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MODELSMoDELS-v2-2010-LanoR #model transformation #modelling #slicing #uml #using
Slicing of UML Models Using Model Transformations (KL, SKR), pp. 228–242.
MODELSMoDELS-v2-2010-LoniewskiIA #bibliography #development #modelling #requirements
A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
ECOOPECOOP-2010-DhooliaMSS #debugging #using
Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
ECOOPECOOP-2010-GilL #java #source code
The Use of Overloading in Java Programs (JYG, KL), pp. 529–551.
ECOOPECOOP-2010-ZaeemK #alloy #contract #data type #using
Contract-Based Data Structure Repair Using Alloy (RNZ, SK), pp. 577–598.
OOPSLAOOPSLA-2010-Kell #adaptation #assembly #component #interface #using
Component adaptation and assembly using interface relations (SK), pp. 322–340.
OOPSLAOOPSLA-2010-LernerVG #aspect-oriented #javascript #using
Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
OOPSLAOOPSLA-2010-ShiPYLZCZ #concurrent #debugging #detection #invariant
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs (YS, SP, ZY, SL, YZ, WC, WZ), pp. 160–174.
LOPSTRLOPSTR-2010-VoetsS #analysis #logic programming #source code #using
Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PPDPPPDP-2010-BrabrandT #ambiguity #pattern matching #regular expression #string #using
Typed and unambiguous pattern matching on strings using regular expressions (CB, JGT), pp. 243–254.
QAPLQAPL-2010-AltisenLM #automaton #calculus #component #evaluation #interface #performance #realtime #using
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata (KA, YL, MM), pp. 16–33.
PADLPADL-2010-DieterleHL #composition #using
Skeleton Composition Using Remote Data (MD, TH, RL), pp. 73–87.
POPLPOPL-2010-DiasR #automation #declarative #generative #using
Automatically generating instruction selectors using declarative machine descriptions (JD, NR), pp. 403–416.
RERE-2010-Beatty10a
If You Build It, Will They Use It? Leveraging Business Objectives to Deliver Successful Projects (JB), pp. 413–414.
RERE-2010-BittnerRGW #multi #requirements #using
Manufacturer-Supplier Requirements Synchronization Using Exchange Containers and Multi-Level Systems (MB, MOR, HG, MW), pp. 325–330.
RERE-2010-ClementsB #architecture #using
Using Business Goals to Inform a Software Architecture (PCC, LB), pp. 69–78.
RERE-2010-LockerbieBMBE #analysis #concept #modelling #simulation #using
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RERE-2010-SalinesiMDD #constraints #integer #requirements #reuse #theorem proving #using
Using Integer Constraint Solving in Reuse Based Requirements Engineering (CS, RM, DD, OD), pp. 243–251.
RERE-2010-SawahMR #bibliography #elicitation #modelling #perspective #requirements #using
Using Cognitive Mapping to Elicit Modelling Requirements: An Overview (SES, AM, MR), pp. 357–363.
RERE-2010-SeyffGG #information management #using
Using Contextual Information to Guide on-site Analysts (NS, FG, PG), pp. 397–398.
RERE-2010-SeyffGM #mobile #tool support #using
Using Mobile RE Tools to Give End-Users Their Own Voice (NS, FG, NAMM), pp. 37–46.
RERE-2010-SinhaPTN #analysis #automation #case study #natural language
Extending Automated Analysis of Natural Language Use Cases to Other Languages (AS, AMP, HT, TN), pp. 364–369.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface #using
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RERE-2010-WnukCR #reduction #requirements #towards #using
Guiding Requirements Scoping Using ROI: Towards Agility, Openness and Waste Reduction (KW, DC, BR), pp. 409–410.
REFSQREFSQ-2010-BrillSK #case study #question #requirements
Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure? (OB, KS, EK), pp. 30–44.
REFSQREFSQ-2010-ProynovaPWW #perspective #requirements #research
Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
SACSAC-2010-AlmeidaYA10a #principle #using
Filtering spams using the minimum description length principle (TAA, AY, JA), pp. 1854–1858.
SACSAC-2010-BechikhSG #mobile #multi #optimisation #using
Searching for knee regions in multi-objective optimization using mobile reference points (SB, LBS, KG), pp. 1118–1125.
SACSAC-2010-BettiniDS #implementation #product line #using
Implementing software product lines using traits (LB, FD, IS), pp. 2096–2102.
SACSAC-2010-BicegoLOP #array #classification #modelling #topic #using
Expression microarray classification using topic models (MB, PL, BO, AP), pp. 1516–1520.
SACSAC-2010-BrogleBB #multi #quality #using
Quality of service for multicasting using NICE (MB, SB, TB), pp. 670–677.
SACSAC-2010-BucchiaroneGFT #experience #natural language #requirements #scalability #set #using
An experience in using a tool for evaluating a large set of natural language requirements (AB, SG, AF, GT), pp. 281–286.
SACSAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited #using
Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SACSAC-2010-ChowdhuryZ #complexity #metric #question
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? (IC, MZ), pp. 1963–1969.
SACSAC-2010-DrumondG #concept #logic #markov #ontology #using
Extracting ontology concept hierarchies from text using Markov logic (LD, RG), pp. 1354–1358.
SACSAC-2010-FunfzigTA #constraints #parametricity #using
Haptic manipulation of rational parametric planar cubics using shape constraints (CF, PT, GA), pp. 1253–1257.
SACSAC-2010-FuPTW #using
Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
SACSAC-2010-GabrielSN #clustering #matrix #similarity #using
Eigenvector-based clustering using aggregated similarity matrices (HHG, MS, AN), pp. 1083–1087.
SACSAC-2010-GiuntaPT #aspect-oriented #design pattern #using
Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SACSAC-2010-GoncalvesCCGS #modelling #towards #using
Towards the modeling reactive and proactive agents by using MAS-ML (EJTG, MIC, GALdC, GFG, VTdS), pp. 936–937.
SACSAC-2010-GongWWLZY #using
Recognizing affect from non-stylized body motion using shape of Gaussian descriptors (LG, TW, CW, FL, FZ, XY), pp. 1203–1206.
SACSAC-2010-GuermaziHH #analysis #classification #image #using #web
Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SACSAC-2010-GuoQL #configuration management #energy #network #optimisation #using
A general energy optimization model for wireless networks using configurable antennas (SG, ZQ, SL), pp. 246–250.
SACSAC-2010-HadarKPRRS #case study #comprehension #empirical #modelling #requirements
An empirical study of requirements model understanding: Use Case vs. Tropos models (IH, TK, AP, IRB, FR, AS), pp. 2324–2329.
SACSAC-2010-HassanB #distributed #file system #using
Semi-join computation on distributed file systems using map-reduce-merge model (MAHH, MB), pp. 406–413.
SACSAC-2010-HautakorpiM #algorithm #network #using
Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA) (JH, JM), pp. 655–662.
SACSAC-2010-HeinzlS #using #validation #xml
Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SACSAC-2010-HoqueRA #named #protocol #scalability #using
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-JiKYC #3d #how #interactive #using
How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
SACSAC-2010-KimKMY #multi #network #predict #probability #using
Probabilistic context prediction using time-inferred multiple pattern networks (YHK, WK, KM, YY), pp. 1015–1019.
SACSAC-2010-Kuzume #using
Input device for disabled persons using expiration and tooth-touch sound signals (KK), pp. 1159–1164.
SACSAC-2010-LanLSH #algorithm #classification #image #using
An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SACSAC-2010-LeeJL #detection #graph #using
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LeeKWAHP #3d #finite #random #using
Tracking random finite objects using 3D-LIDAR in marine environments (KWL, BK, WSW, MA, FSH, NMP), pp. 1282–1287.
SACSAC-2010-MacielNJIS #interactive #using
Reality cues-based interaction using whole-body awareness (AM, LPN, VAMJ, JMTI, LFMSS), pp. 1224–1228.
SACSAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability #using
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SACSAC-2010-MaranzatoPLN #detection #using
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SACSAC-2010-McDonaldTKG #component #reduction #using
Using logic-based reduction for adversarial component recovery (JTM, EDT, YCK, MRG), pp. 1993–2000.
SACSAC-2010-MenorBBGP #classification #markov #taxonomy #using
Virus DNA-fragment classification using taxonomic hidden Markov model profiles (MM, KB, MB, YG, GP), pp. 1567–1571.
SACSAC-2010-MiaoOWS #distributed #network #using
Coverage-hole trap model in target tracking using distributed relay-robot network (HM, CCO, XW, CS), pp. 1299–1304.
SACSAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity #using
Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SACSAC-2010-MillerRPW #identification #using
Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
SACSAC-2010-MissenBC #detection #using
Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SACSAC-2010-MustaphaZAG #composition #ontology #semantics #using
Enhancing semantic search using case-based modular ontology (NBM, HBZ, MAA, HHBG), pp. 1438–1439.
SACSAC-2010-NinagawaE #modelling #network #predict #probability #using
Link prediction using probabilistic group models of network structure (AN, KE), pp. 1115–1116.
SACSAC-2010-ParizekY #component #interactive #traversal #using
Extraction of component-environment interaction model using state space traversal (PP, NY), pp. 2203–2210.
SACSAC-2010-Perez-CastilloGP #on the #process
On the use of patterns to recover business processes (RPC, IGRdG, MP), pp. 165–166.
SACSAC-2010-PirkolaT #approach #crawling #problem #using
Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
SACSAC-2010-PortugalR #algorithm #clustering #graph #multi #using
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning (DP, RPR), pp. 1271–1276.
SACSAC-2010-RiponGHT #approach #layout #multi #problem #using
Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
SACSAC-2010-Rittgen #modelling #process #quality
Quality and perceived usefulness of process models (PR), pp. 65–72.
SACSAC-2010-Roder #interactive #requirements #usability #using
Using interaction requirements to operationalize usability (HR), pp. 318–319.
SACSAC-2010-RodriguesNPM #parallel #thread
A new technique for data privatization in user-level threads and its use in parallel applications (ERR, POAN, JP, CLM), pp. 2149–2154.
SACSAC-2010-RoyPL #component #detection #documentation #image #using
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SACSAC-2010-RyuCC #image #layout #named #using
PHOTOLAND: a new image layout system using spatio-temporal information in digital photos (DSR, WKC, HGC), pp. 1884–1891.
SACSAC-2010-ShahinLK #architecture #design #using #visualisation
Rationale visualization of software architectural design decision using compendium (MS, PL, MRK), pp. 2367–2368.
SACSAC-2010-ShinKNNTO #named #ontology #recommendation #using
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping--- (IS, TK, HN, KN, YT, AO), pp. 1442–1443.
SACSAC-2010-SmithH #documentation #image #retrieval #using
Document retrieval using image features (DS, RH), pp. 47–51.
SACSAC-2010-StoffelSKK #analysis #documentation #using #visual notation
Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SACSAC-2010-VermolenHL #consistency #modelling #proving #using
Proving consistency of VDM models using HOL (SV, JH, PGL), pp. 2503–2510.
SACSAC-2010-WeeL #using
Client-side load balancer using cloud (SW, HL), pp. 399–405.
SACSAC-2010-Youssef #metric #parallel #performance #using
Using surface effect measures to model parallel performance (BBY), pp. 2400–2401.
FSEFSE-2010-ErnstA #type system #using
Building and using pluggable type systems (MDE, MA), pp. 375–376.
FSEFSE-2010-HalleB #analysis #interactive #message passing #using
Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSEFSE-2010-KanadeARR #dependence #representation #testing #using
Representation dependence testing using program inversion (AK, RA, SKR, GR), pp. 277–286.
FSEFSE-2010-MyersS #dynamic analysis #ide #user interface #using
Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
FSEFSE-2010-Shokry #behaviour #synthesis #towards #using
Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
FSEFSE-2010-WinbladhZR #interactive #modelling #named
iMuse: interactive model-based use-case and storytelling environment (KW, HZ, DJR), pp. 383–384.
ICSEICSE-2010-AdamsJH #identification #using
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-FritzM #developer #using
Using information fragments to answer the questions developers ask (TF, GCM), pp. 175–184.
ICSEICSE-2010-GorschekTA #concept #empirical #object-oriented #scalability
A large-scale empirical study of practitioners’ use of object-oriented concepts (TG, EDT, LA), pp. 115–124.
ICSEICSE-2010-JilaniMLGM #invariant #using
Using invariant functions and invariant relations to compute loop functions (LLJ, OM, AL, WG, AM), pp. 317–318.
ICSEICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference #using
Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
ICSEICSE-2010-LewisW #fault #monitoring #runtime #using
Runtime repair of software faults using event-driven monitoring (CL, JW), pp. 275–280.
ICSEICSE-2010-LimQF #named #network #scalability #social #using
StakeNet: using social networks to analyse the stakeholders of large-scale software projects (SLL, DQ, AF), pp. 295–304.
ICSEICSE-2010-Marinho #consistency #modelling #ocl #product line #using
A proposal for consistency checking in dynamic software product line models using OCL (FGM), pp. 333–334.
ICSEICSE-2010-NitaN #adaptation #api #source code #using
Using twinning to adapt programs to alternative APIs (MN, DN), pp. 205–214.
ICSEICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation #using
Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
ICSEICSE-2010-SallehMGB #empirical #programming #using
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (NS, EM, JCG, GSJB), pp. 577–586.
ICSEICSE-2010-SharpdD #re-engineering #research #using
Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSEICSE-2010-TreudeS #developer #using
Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds (CT, MADS), pp. 365–374.
LDTALDTA-J-2007-AkessonEH #attribute grammar #compilation #implementation #jastadd #using
Implementation of a Modelica compiler using JastAdd attribute grammars (, TE, GH), pp. 21–38.
LDTALDTA-J-2007-CamachoMBV #automation #generative #tool support #using #verification
Automated generation of program translation and verification tools using annotated grammars (DOC, KM, MvdB, JJV), pp. 3–20.
LDTALDTA-2010-Freudenthal #domain-specific language #enterprise #using
Using DSLs for developing enterprise systems (MF), p. 11.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics #using
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SLESLE-2010-JohnstoneS10a #generative #using
Translator Generation Using ART (AJ, ES), pp. 306–315.
SPLCSPLC-2010-Elizondo #composition #development #using
Using Composition Connectors to Support Software Asset Development (PVE), pp. 496–497.
SPLCSPLC-2010-GadelhaCGCFL #approach #component #product line #using
An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
SPLCSPLC-2010-GhanamM #execution #feature model #modelling #testing #using
Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
SPLCSPLC-2010-HartmannKMRTY #component #integration #using
Using MDA for Integration of Heterogeneous Components in Software Supply Chains (HH, MK, AAJM, JR, TT, TYH), pp. 361–376.
ASPLOSASPLOS-2010-KirmanM #power management #using
A power-efficient all-optical on-chip interconnect using wavelength-based oblivious routing (NK, JFM), pp. 15–28.
ASPLOSASPLOS-2010-RamanKMJA #concurrent #parallel #thread #transaction #using
Speculative parallelization using software multi-threaded transactions (AR, HK, TRM, TBJ, DIA), pp. 65–76.
ASPLOSASPLOS-2010-WooL #gpu #named #programmable #using
COMPASS: a programmable data prefetcher using idle GPU shaders (DHW, HHSL), pp. 297–310.
CCCC-2010-CraikK #object-oriented #parallel #source code #using
Using Ownership to Reason about Inherent Parallelism in Object-Oriented Programs (AC, WK), pp. 145–164.
CGOCGO-2010-GottschlichVS #memory management #performance #transaction #using
An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
HPCAHPCA-2010-BiswasRMACJPPS #metric #using
Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
HPCAHPCA-2010-KaseridisSCJ #resource management #scalability #using
A bandwidth-aware memory-subsystem resource management using non-invasive resource profilers for large CMP systems (DK, JS, JC, LKJ), pp. 1–11.
HPCAHPCA-2010-TangBHC #architecture #cpu #performance #using
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance (DT, YB, WH, MC), pp. 1–12.
HPDCHPDC-2010-BatiniGM #architecture #enterprise #using
Optimal enterprise data architecture using publish and subscribe (CB, SG, AM), pp. 541–547.
HPDCHPDC-2010-BhagawatyJPABK #design #implementation #simulation
Design, implementation and use of a simulation data archive for coastal science (HB, LJ, SP, GA, NB, TK), pp. 651–657.
HPDCHPDC-2010-BuiYT #abstraction #distributed #named #python #using #workflow
Weaver: integrating distributed computing abstractions into scientific workflows using Python (PB, LY, DT), pp. 636–643.
HPDCHPDC-2010-ChenCHCH #adaptation #using
Improving host swapping using adaptive prefetching and paging notifier (WZC, HC, WH, XC, DH), pp. 300–303.
HPDCHPDC-2010-CoutinhoOOBLDM #parallel #using #workflow
Data parallelism in bioinformatics workflows using Hydra (FC, ESO, DdO, VPB, AABL, AMRD, MM), pp. 507–515.
HPDCHPDC-2010-DonassoloCLV #performance #scalability #simulation #using #volunteer
Fast and scalable simulation of volunteer computing systems using SimGrid (BD, HC, AL, PV), pp. 605–612.
HPDCHPDC-2010-HenschelMS #distributed #using #workflow
A distributed workflow for an astrophysical OpenMP application: using the data capacitor over WAN to enhance productivity (RH, SM, SCS), pp. 644–650.
HPDCHPDC-2010-JabriM #using
Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
HPDCHPDC-2010-KimHMAJ #distributed #energy #scalability #using
Exploring the RNA folding energy landscape using scalable distributed cyberinfrastructure (JK, WH, SM, FAE, SJ), pp. 477–488.
HPDCHPDC-2010-LiewAHH #data type #distributed #graph #optimisation #parallel #streaming #towards #using
Towards optimising distributed data streaming graphs using parallel streams (CSL, MPA, JIvH, LH), pp. 725–736.
HPDCHPDC-2010-LimPF #named #performance #using
SoftPower: fine-grain power estimations using performance counters (MYL, AP, RJF), pp. 308–311.
HPDCHPDC-2010-StoutFMG #clustering #network #scalability #using
Scaling virtual organization clusters over a wide area network using the Kestrel workload management system (LS, MF, MAM, SG), pp. 692–698.
HPDCHPDC-2010-StuartCMO #multi #pipes and filters #using
Multi-GPU volume rendering using MapReduce (JAS, CKC, KLM, JDO), pp. 841–848.
ISMMISMM-2010-TianFG #parallel #predict #using
Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
OSDIOSDI-2010-AnanthanarayananKGSLSH #clustering #using
Reining in the Outliers in Map-Reduce Clusters using Mantri (GA, SK, AGG, IS, YL, BS, EH), pp. 265–278.
OSDIOSDI-2010-FeldmanZFF #collaboration #named #using
SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
OSDIOSDI-2010-KimWZK #using
Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
OSDIOSDI-2010-PengD #distributed #incremental #scalability #transaction #using
Large-scale Incremental Processing Using Distributed Transactions and Notifications (DP, FD), pp. 251–264.
PPoPPPPoPP-2010-CastaldoW #parallel #scalability #using
Scaling LAPACK panel operations using parallel cache assignment (AMC, RCW), pp. 223–232.
PPoPPPPoPP-2010-LupeiSPMBKA #game studies #memory management #parallel #scalability #towards #transaction #using
Towards scalable and transparent parallelization of multiplayer games using transactional memory support (DL, BS, DP, MM, MB, WK, CA), pp. 325–326.
PPoPPPPoPP-2010-SandesM #comparison #gpu #named #sequence #using
CUDAlign: using GPU to accelerate the comparison of megabase genomic sequences (EFdOS, ACMAdM), pp. 137–146.
PPoPPPPoPP-2010-UpadhyayaMP #data type #generative #performance #using
Using data structure knowledge for efficient lock generation and strong atomicity (GU, SPM, VSP), pp. 281–292.
PPoPPPPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability #using
PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
PPoPPPPoPP-2010-ZyulkyarovHUCV #debugging #memory management #source code #transaction
Debugging programs that use atomic blocks and transactional memory (FZ, TH, OSÜ, AC, MV), pp. 57–66.
CAVCAV-2010-TorreMP #concurrent #interface #linear #model checking #source code #using
Model-Checking Parameterized Concurrent Programs Using Linear Interfaces (SLT, PM, GP), pp. 629–644.
ICLPICLP-2010-ShakarianSS10 #network #optimisation #problem #social #source code #using
Using Generalized Annotated Programs to Solve Social Network Optimization Problems (PS, VSS, MLS), pp. 182–191.
ICSTICST-2010-DebroyW #automation #source code #using
Using Mutation to Automatically Suggest Fixes for Faulty Programs (VD, WEW), pp. 65–74.
ICSTICST-2010-HuangCM #algorithm #search-based #testing #user interface #using
Repairing GUI Test Suites Using a Genetic Algorithm (SH, MBC, AMM), pp. 245–254.
ICSTICST-2010-Laurent #concept #formal method #process #testing #using #validation #verification
Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICSTICST-2010-SinhaSP #automation #case study #named #natural language
Text2Test: Automated Inspection of Natural Language Use Cases (AS, SMSJ, AMP), pp. 155–164.
ICTSSICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol #using
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
ICTSSICTSS-2010-ArcuriIB #black box #embedded #random #realtime #search-based #testing #using
Black-Box System Testing of Real-Time Embedded Systems Using Random and Search-Based Testing (AA, MZZI, LCB), pp. 95–110.
ICTSSICTSS-2010-LamanchaU #generative #product line #testing #using
Testing Product Generation in Software Product Lines Using Pairwise for Features Coverage (BPL, MPU), pp. 111–125.
ISSTAISSTA-2010-DanielGM #execution #on the #symbolic computation #using
On test repair using symbolic execution (BD, TG, DM), pp. 207–218.
ISSTAISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing #using
Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
ICSTSAT-2010-Ehlers #automaton #satisfiability #using
Minimising Deterministic Büchi Automata Precisely Using SAT Solving (RE), pp. 326–332.
ICSTSAT-2010-FuhsS #linear #satisfiability #source code #using
Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT (CF, PSK), pp. 71–84.
TAPTAP-2010-BueDKB #abstraction #behaviour #using
Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
TAPTAP-2010-ClaessenSH #named #specification #testing #using
QuickSpec: Guessing Formal Specifications Using Testing (KC, NS, JH), pp. 6–21.
TAPTAP-2010-GladischTBY #generative #testing #using #verification
Generating Regression Unit Tests Using a Combination of Verification and Capture & Replay (CG, SST, BB, AY), pp. 61–76.
VMCAIVMCAI-2010-BuZL #automaton #hybrid #programming #reachability #using #verification
Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming (LB, JZ, XL), pp. 78–94.
CBSECBSE-2009-Bickford #component #specification #using
Component Specification Using Event Classes (MB), pp. 140–155.
QoSAQoSA-2009-KrogmannSBKMM #architecture #feedback #performance #predict #using #visualisation
Improved Feedback for Architectural Performance Prediction Using Software Cartography Visualizations (KK, CMS, SB, MK, AM, FM), pp. 52–69.
WICSA-ECSAWICSA-ECSA-2009-AboudAFHTUV #architecture #automation #classification #component #concept #using
Automated architectural component classification using concept lattices (NAA, GA, JRF, MH, CT, CU, SV), pp. 21–30.
WICSA-ECSAWICSA-ECSA-2009-Babar #agile #architecture #case study #challenge #development #using
An exploratory study of architectural practices and challenges in using agile software development approaches (MAB), pp. 81–90.
WICSA-ECSAWICSA-ECSA-2009-BucchiaronePVR #modelling #self #using #verification
Self-Repairing systems modeling and verification using AGG (AB, PP, CV, OR), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2009-EmeryH #architecture #framework #using
Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 (DEE, RH), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2009-LiuLXSZ #architecture #enterprise #integration #using
Using architecture integration patterns to compose enterprise mashups (YL, XL, LX, MS, LZ), pp. 111–120.
WICSA-ECSAWICSA-ECSA-2009-NordCEH #architecture #documentation #set #using
Reviewing architecture documents using question sets (RLN, PCC, DEE, RH), pp. 325–328.
WICSA-ECSAWICSA-ECSA-2009-RooSA #adaptation #architecture #embedded #multi #optimisation #using
An architectural style for optimizing system qualities in adaptive embedded systems using Multi-Objective Optimization (AdR, HS, MA), pp. 349–352.
ASEASE-2009-CassellAGN #automation #clustering #towards #using
Towards Automating Class-Splitting Using Betweenness Clustering (KC, PA, LG, JN), pp. 595–599.
ASEASE-2009-GuldaliFJSE #automation #clustering #requirements #testing #using
Semi-automated Test Planning for e-ID Systems by Using Requirements Clustering (BG, HF, MJ, SS, GE), pp. 29–39.
ASEASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise #using
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASEASE-2009-LedruPB #string #testing #using
Using String Distances for Test Case Prioritisation (YL, AP, SB), pp. 510–514.
ASEASE-2009-LiXTHS #automation #generative #named #regular expression #source code #testing #using
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions (NL, TX, NT, JdH, WS), pp. 515–519.
ASEASE-2009-MalikGEK #automation #data type #debugging #using
A Case for Automated Debugging Using Data Structure Repair (MZM, KG, BE, SK), pp. 620–624.
ASEASE-2009-RayMACSM #using #validation #verification
Validating Automotive Control Software Using Instrumentation-Based Verification (AR, IM, CA, RC, CPS, CM), pp. 15–25.
ASEASE-2009-WeiglhoferFW #fault #locality #testing #using
Using Spectrum-Based Fault Localization for Test Case Grouping (MW, GF, FW), pp. 630–634.
ASEASE-2009-YuAB #analysis #generative #source code #string #using
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
CASECASE-2009-AlenljungL #graph #using #verification
Formal verification of PLC controlled systems using Sensor Graphs (TA, BL), pp. 164–170.
CASECASE-2009-BalajiGK #case study #using
Selection of a machine tool for FMS using ELECTRE III — a case study (CMB, AG, RK), pp. 171–176.
CASECASE-2009-BeraN #using
A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
CASECASE-2009-BukkapatnamMKSK #monitoring #realtime #using
Real-time monitoring of container stability loss using wireless vibration sensor tags (STSB, SM, JK, VS, RK), pp. 221–226.
CASECASE-2009-ChakiC #approach #automation #fuzzy #multi #using
An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
CASECASE-2009-ChengP #predict
A fusion prognostics method for remaining useful life prediction of electronic products (SC, MGP), pp. 102–107.
CASECASE-2009-GargM #agile #algorithm #clustering #named #using
RACK: RApid clustering using K-means algorithm (VKG, MNM), pp. 621–626.
CASECASE-2009-HariharanB #markov #process #using
Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
CASECASE-2009-JohnsonM #animation #automation #optimisation #synthesis #using
Automated trajectory synthesis from animation data using trajectory optimization (ERJ, TDM), pp. 274–279.
CASECASE-2009-KumarWKSS #analysis #fuzzy #predict #using #variability
A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASECASE-2009-Makkapati #segmentation #using
Improved wavelet-based microscope autofocusing for blood smears by using segmentation (VM), pp. 208–211.
CASECASE-2009-NaveenRR #algorithm #difference #evolution #network #search-based #using
Rule extraction from differential evolution trained radial basis function network using genetic algorithms (NN, VR, CRR), pp. 152–157.
CASECASE-2009-SenguptaDBMD #detection #fault #modelling #using
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CASECASE-2009-VoronovA #model checking #process #using #verification
Verification of process operations using model checking (AV, ), pp. 415–420.
CASECASE-2009-YuanZ #using
Micro-mixing of highly viscous bio-samples using orbital shaking (LY, YFZ), pp. 579–584.
DACDAC-2009-AbercrombiePC #design #equation #simulation
Use of lithography simulation for the calibration of equation-based design rule checks (DA, FP, CC), pp. 67–70.
DACDAC-2009-BaiocchiC #in memory #memory management #using
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DACDAC-2009-ChoudhuryM #logic #lookahead #optimisation #using
Timing-driven optimization using lookahead logic circuits (MRC, KM), pp. 390–395.
DACDAC-2009-EllithorpeTK #architecture #named #network #using
Internet-in-a-Box: emulating datacenter network architectures using FPGAs (JDE, ZT, RHK), pp. 880–883.
DACDAC-2009-FeySD #bound #fault tolerance #using
Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DACDAC-2009-GhaniN #approximate #grid #performance #power management #using #verification
Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
DACDAC-2009-HelinskiAP #physics #using
A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
DACDAC-2009-JainC #graph #performance #satisfiability #using
Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts (HJ, EMC), pp. 563–568.
DACDAC-2009-LeeK #manycore #optimisation #throughput #using
Optimizing throughput of power- and thermal-constrained multicore processors using DVFS and per-core power-gating (JL, NSK), pp. 47–50.
DACDAC-2009-MehrotraS #performance #robust #using
A robust and efficient harmonic balance (HB) using direct solution of HB Jacobian (AM, AS), pp. 370–375.
DACDAC-2009-PatilLZWM #logic #using
Digital VLSI logic technology using Carbon Nanotube FETs: frequently asked questions (NP, AL, JZ, HSPW, SM), pp. 304–309.
DACDAC-2009-PotkonjakNNM #detection #hardware #using
Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DACDAC-2009-SarbisheiAF #clustering #heuristic #optimisation #polynomial #using
Polynomial datapath optimization using partitioning and compensation heuristics (OS, BA, MF), pp. 931–936.
DACDAC-2009-ShinPS #synthesis #using
Register allocation for high-level synthesis using dual supply voltages (IS, SP, YS), pp. 937–942.
DACDAC-2009-StrojwasJRP #using
Creating an affordable 22nm node using design-lithography co-optimization (AJS, TJ, VR, LTP), pp. 95–96.
DACDAC-2009-WangCSC #graph #power management #synthesis #using
Low power gated bus synthesis using shortest-path Steiner graph for system-on-chip communications (RW, NCC, BS, CKC), pp. 166–171.
DACDAC-2009-WuDL #3d #integer #named #programming #scalability #using
GRIP: scalable 3D global routing using integer programming (THW, AD, JTL), pp. 320–325.
DACDAC-2009-ZengZNGGS #optimisation #scheduling #using
Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
DACDAC-2009-ZhangS #estimation #using
Accurate temperature estimation using noisy thermal sensors (YZ, AS), pp. 472–477.
DATEDATE-2009-AlvesNDB #detection #fault #multi #using
Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATEDATE-2009-BaertBWA #using
Exploring parallelizations of applications for MPSoC platforms using MPA (RB, EB, SW, TJA), pp. 1148–1153.
DATEDATE-2009-BellasiFS #analysis #modelling #multi #power management #predict
Predictive models for multimedia applications power consumption based on use-case and OS level analysis (PB, WF, DS), pp. 1446–1451.
DATEDATE-2009-BildBD #performance #using
Minimization of NBTI performance degradation using internal node control (DRB, GEB, RPD), pp. 148–153.
DATEDATE-2009-ChangBM #design #using
Customizing IP cores for system-on-chip designs using extensive external don’t-cares (KHC, VB, ILM), pp. 582–585.
DATEDATE-2009-DarbariAFB #design #simulation #using
Selective state retention design using symbolic simulation (AD, BMAH, DF, JB), pp. 1644–1649.
DATEDATE-2009-DensmoreSDPS #design #evaluation #framework #using
UMTS MPSoC design evaluation using a system level design framework (DD, AS, AD, RP, ALSV), pp. 478–483.
DATEDATE-2009-GuoS #bound #design #distributed #optimisation #using
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATEDATE-2009-KinsmanN #finite #modulo theories #precise #using
Finite Precision bit-width allocation using SAT-Modulo Theory (ABK, NN), pp. 1106–1111.
DATEDATE-2009-KirchnerBG #simulation #using
Analogue mixed signal simulation using spice and SystemC (TK, NB, CG), pp. 284–287.
DATEDATE-2009-KochteZIKRWCP #modelling #transaction #using #validation
Test exploration and validation using transaction level models (MAK, CGZ, MEI, RSK, MR, HJW, SDC, PP), pp. 1250–1253.
DATEDATE-2009-KravetsM #logic #synthesis #using
Sequential logic synthesis using symbolic bi-decomposition (VNK, AM), pp. 1458–1463.
DATEDATE-2009-LinW #using
Rewiring using IRredundancy Removal and Addition (CCL, CYW), pp. 324–327.
DATEDATE-2009-MitraZPW #logic #using
Imperfection-immune VLSI logic circuits using Carbon Nanotube Field Effect Transistors (SM, JZ, NP, HW), pp. 436–441.
DATEDATE-2009-MollCRB #modelling #performance #protocol #using
Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATEDATE-2009-OzturkK #compilation #execution #memory management #using
Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
DATEDATE-2009-PurandareWK #abstraction #refinement #using
Strengthening properties using abstraction refinement (MP, TW, DK), pp. 1692–1697.
DATEDATE-2009-RealVD #correlation #using
Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
DATEDATE-2009-RobertsKM #energy #memory management #using
Using non-volatile memory to save energy in servers (DR, TK, TNM), pp. 743–748.
DATEDATE-2009-SafizadehTATB #nondeterminism #using
Using randomization to cope with circuit uncertainty (HS, MT, EKA, GT, KB), pp. 815–820.
DATEDATE-2009-SinhaRBS #design #multi #protocol #using
Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATEDATE-2009-TannirK #analysis #using
Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATEDATE-2009-WangCTHR #modelling #optimisation #performance #polynomial #using
An efficient decoupling capacitance optimization using piecewise polynomial models (XW, YC, SXDT, XH, JR), pp. 1190–1195.
DATEDATE-2009-WangM #using
An accurate interconnect thermal model using equivalent transmission line circuit (BW, PM), pp. 280–283.
DocEngDocEng-2009-DiazAK #product line #using
Using DITA for documenting software product lines (OD, FIA, JK), pp. 231–240.
DocEngDocEng-2009-Hassan09a #documentation #graph #interactive #named #using
GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
DocEngDocEng-2009-JoshiL #analysis #documentation #image #natural language #using #web
Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRRDRR-2009-HalimaA #concept #recognition #segmentation #using
Simultaneous segmentation and recognition of Arabic printed text using linguistic concepts of vocabulary (MBH, AMA), pp. 1–10.
DRRDRR-2009-LiD #difference #independence #using #verification
Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRRDRR-2009-NakaiKI #documentation #image #using
Camera-based document image mosaicing using LLAH (TN, KK, MI), pp. 1–10.
DRRDRR-2009-NonnemakerB #classification #using
Using synthetic data safely in classification (JN, HSB), pp. 1–10.
DRRDRR-2009-TaghvaC #analysis #bound #documentation #using
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRRDRR-2009-TanVK #clustering #identification #online #using
Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
HTHT-2009-AmitayCHOSYG #approach #social #using
Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
HTHT-2009-HargoodMW #using
Using a thematic model to enrich photo montages (CH, DEM, MJW), pp. 135–140.
HTHT-2009-Martinez-RomoA #approach #information management #using #web
Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
HTHT-2009-WangC #analysis #web
Use noisy link analysis to improve web search (YW, JC), pp. 377–378.
ICDARICDAR-2009-Abd-AlmageedKD #documentation #linear #using
Page Rule-Line Removal Using Linear Subspaces in Monochromatic Handwritten Arabic Documents (WAA, JK, DSD), pp. 768–772.
ICDARICDAR-2009-AbdulkaderC #fault #learning #low cost #multi #using
Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment (AA, MRC), pp. 576–580.
ICDARICDAR-2009-AhmadVK #markov #recognition #using #word
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model (ARA, CVG, MK), pp. 161–165.
ICDARICDAR-2009-BarratT #image #modelling #network #using
Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
ICDARICDAR-2009-BledaBGZLMPV #online #recognition #using
Improving a DTW-Based Recognition Engine for On-line Handwritten Characters by Using MLPs (MJCB, SEB, JGM, FZM, DLP, AMV, FPV, JMVT), pp. 1260–1264.
ICDARICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming #using
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDARICDAR-2009-BoussellaaBZAA #algorithm #documentation #image #using
Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm (WB, AB, AZ, HEA, AMA), pp. 743–747.
ICDARICDAR-2009-BukhariSB09a #independence #segmentation #using
Script-Independent Handwritten Textlines Segmentation Using Active Contours (SSB, FS, TMB), pp. 446–450.
ICDARICDAR-2009-CaoPSN #adaptation #clustering #using
Unsupervised HMM Adaptation Using Page Style Clustering (HC, RP, SS, PN), pp. 1091–1095.
ICDARICDAR-2009-DiemS #recognition #using
Recognition of Degraded Handwritten Characters Using Local Features (MD, RS), pp. 221–225.
ICDARICDAR-2009-ElbaatiBKEAA #recognition #using
Arabic Handwriting Recognition Using Restored Stroke Chronology (AE, HB, MK, AE, HEA, AMA), pp. 411–415.
ICDARICDAR-2009-FornesLSB #identification #music #on the
On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
ICDARICDAR-2009-GalballyFMO #evaluation #using #verification
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDARICDAR-2009-GarainP #identification #multi #using
Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
ICDARICDAR-2009-HamdaniAKA #multi #online #recognition #using
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition (MH, HEA, MK, AMA), pp. 201–205.
ICDARICDAR-2009-HanifP #algorithm #detection #image #locality #using
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDARICDAR-2009-Hassan #documentation #graph #using
User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
ICDARICDAR-2009-HeH09a #classification #estimation #online #using
Affine Distortion Compensation for an Isolated Online Handwritten Chinese Character Using Combined Orientation Estimation and HMM-Based Minimax Classification (TH, QH), pp. 1226–1230.
ICDARICDAR-2009-HoangTP #diagrams #image #using
Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram (TVH, ST, NYP), pp. 921–925.
ICDARICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition #using
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-ImpedovoFM #recognition #using #word
HMM Based Handwritten Word Recognition System by Using Singularities (SI, AF, RM), pp. 783–787.
ICDARICDAR-2009-KimLK #mobile #using
Scene Text Extraction Using Focus of Mobile Camera (EK, SL, JHK), pp. 166–170.
ICDARICDAR-2009-LandreMR #classification #difference #image #using
Ornamental Letters Image Classification Using Local Dissimilarity Maps (JL, FMN, SR), pp. 186–190.
ICDARICDAR-2009-LeloreB #documentation #image #markov #using
Document Image Binarisation Using Markov Field Model (TL, FB), pp. 551–555.
ICDARICDAR-2009-LuqmanBR #classification #graph #network #recognition #using
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDARICDAR-2009-MansjurWJ #automation #categorisation #classification #kernel #learning #topic #using
Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization (DSM, TSW, BHJ), pp. 1086–1090.
ICDARICDAR-2009-MarinaiMS #clustering #order #using
Mathematical Symbol Indexing Using Topologically Ordered Clusters of Shape Contexts (SM, BM, GS), pp. 1041–1045.
ICDARICDAR-2009-MiyaoM #adaptation #online #recognition #using
Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples (HM, MM), pp. 1156–1160.
ICDARICDAR-2009-MoghaddamRC #approach #classification #independence #multi #segmentation #set #using
Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
ICDARICDAR-2009-MontreuilGHN #2d #documentation #layout #random #using
Unconstrained Handwritten Document Layout Extraction Using 2D Conditional Random Fields (FM, EG, LH, SN), pp. 853–857.
ICDARICDAR-2009-MuramatsuYM #authentication #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-NakaiKI #documentation #image #realtime #retrieval #using #web
Real-Time Retrieval for Images of Documents in Various Languages Using a Web Camera (TN, KK, MI), pp. 146–150.
ICDARICDAR-2009-PalWK #case study #classification #comparative #recognition #using
Comparative Study of Devnagari Handwritten Character Recognition Using Different Feature and Classifiers (UP, TW, FK), pp. 1111–1115.
ICDARICDAR-2009-PanBS #recognition #using
Isolated Handwritten Farsi Numerals Recognition Using Sparse and Over-Complete Representations (WP, TDB, CYS), pp. 586–590.
ICDARICDAR-2009-PavelecOJNB #identification #modelling #using
Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
ICDARICDAR-2009-RomeroTV #feedback #image #using
Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images (VR, AHT, EV), pp. 96–100.
ICDARICDAR-2009-RoyPLD #multi #programming #segmentation #using
Multi-Oriented and Multi-Sized Touching Character Segmentation Using Dynamic Programming (PPR, UP, JL, MD), pp. 11–15.
ICDARICDAR-2009-SaldarriagaMV #documentation #online #recognition #using
Using top n Recognition Candidates to Categorize On-line Handwritten Documents (SPS, EM, CVG), pp. 881–885.
ICDARICDAR-2009-SundaramR #online #recognition #using
An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDARICDAR-2009-WakaharaU #2d #composition #using
Hierarchical Decomposition of Handwriting Deformation Vector Field Using 2D Warping and Global/Local Affine Transformation (TW, SU), pp. 1141–1145.
ICDARICDAR-2009-WangBA #automation #documentation #using
Document Content Extraction Using Automatically Discovered Features (SYW, HSB, CA), pp. 1076–1080.
ICDARICDAR-2009-WangH #classification #design #fault #modelling #parametricity #precise #using
Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification Error Training and Parameter Compression (YW, QH), pp. 36–40.
ICDARICDAR-2009-YiPX #integration #multi #recognition #using #video
Using Multiple Frame Integration for the Text Recognition of Video (JY, YP, JX), pp. 71–75.
ICDARICDAR-2009-ZhouLN #online #random #recognition #string #using
Online Handwritten Japanese Character String Recognition Using Conditional Random Fields (XDZ, CLL, MN), pp. 521–525.
SIGMODSIGMOD-2009-ChaudhuriNS #profiling #static analysis #using
Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
SIGMODSIGMOD-2009-ChenOG #performance #using
Fast and dynamic OLAP exploration using UDFs (ZC, CO, CGA), pp. 1087–1090.
SIGMODSIGMOD-2009-Chi #social #using #web
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason (EHC), pp. 973–984.
SIGMODSIGMOD-2009-IsardY #distributed #programming language #using
Distributed data-parallel computing using a high-level programming language (MI, YY), pp. 987–994.
SIGMODSIGMOD-2009-PaparizosNSA #data flow #query #using #web
Answering web queries using structured data sources (SP, AN, JCS, RA), pp. 1127–1130.
SIGMODSIGMOD-2009-Plattner #approach #database #in memory #using
A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
SIGMODSIGMOD-2009-ZhangMC #clustering #scalability #using
Scalable skyline computation using object-based space partitioning (SZ, NM, DWC), pp. 483–494.
VLDBVLDB-2009-CanimBMLR #using
An Object Placement Advisor for DB2 Using Solid State Storage (MC, BB, GAM, CAL, KAR), pp. 1318–1329.
VLDBVLDB-2009-CautisDOV #performance #query #set #specification #using #xpath
Efficient Rewriting of XPath Queries Using Query Set Specifications (BC, AD, NO, VV), pp. 301–312.
VLDBVLDB-2009-JohnsonPA #inheritance #scalability #using
Improving OLTP Scalability using Speculative Lock Inheritance (RJ, IP, AA), pp. 479–489.
VLDBVLDB-2009-LeglerLSK #distributed #mining #robust #using
Robust Distributed Top-N Frequent Pattern Mining Using the SAP BW Accelerator (TL, WL, JS, JK), pp. 1438–1449.
VLDBVLDB-2009-LiuJ #using
Using Trees to Depict a Forest (BL, HVJ), pp. 133–144.
VLDBVLDB-2009-NandiB #named #taxonomy #using
HAMSTER: Using Search Clicklogs for Schema and Taxonomy Matching (AN, PAB), pp. 181–192.
VLDBVLDB-2009-PereiraRSTWH #question #using #web
Answering Web Questions Using Structured Data — Dream or Reality? (FP, AR, SS, WTP, GW, AYH), p. 1646.
VLDBVLDB-2009-Rajaraman #named #topic #using #web
Kosmix: High-Performance Topic Exploration using the Deep Web (AR), pp. 1524–1529.
VLDBVLDB-2009-WangSCMKZPY #data transformation #named #semantics #using #web
SMDM: Enhancing Enterprise-Wide Master Data Management Using Semantic Web Technologies (XW, XS, FC, LM, NK, KZ, YP, YY), pp. 1594–1597.
VLDBVLDB-2009-WillhalmPBPZS #in memory #named #performance #using
SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units (TW, NP, YB, HP, AZ, JS), pp. 385–394.
CSEETCSEET-2009-Al-Yahya #re-engineering #using #wiki
Using Wikis to Support Teamwork Skills in Software Engineering Courses (MMAY), pp. 142–149.
CSEETCSEET-2009-GB #education #ontology #re-engineering #using
Using Ontologies to Aid the Teaching of Software Engineering (SPG, AB), pp. 224–231.
CSEETCSEET-2009-KoolmanojwongB #case study #education #experience #research #using
Using Software Project Courses to Integrate Education and Research: An Experience Report (SK, BWB), pp. 26–33.
CSEETCSEET-2009-McMeekinKCC #taxonomy #using
Evaluating Software Inspection Cognition Levels Using Bloom’s Taxonomy (DAM, BRvK, EC, DJAC), pp. 232–239.
CSEETCSEET-2009-Padua #quality #using
Using Quality Audits to Assess Software Course Projects (WP), pp. 162–165.
CSEETCSEET-2009-TaranMSS #authoring #case study #framework #industrial #multi #scalability #using
Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry (GT, RM, RS, AS), pp. 61–68.
CSEETCSEET-2009-WuWSK #development #education #evaluation #framework #game studies #using
An Evaluation of Using a Game Development Framework in Higher Education (BW, AIW, JES, TBK), pp. 41–44.
ITiCSEITiCSE-2009-AhoniemiK
Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
ITiCSEITiCSE-2009-Al-BowAEFFLLM #education #game studies #programming #student #using
Using game creation for teaching computer programming to high school students and teachers (MAB, DA, JE, RF, JF, CL, STL, SM), pp. 104–108.
ITiCSEITiCSE-2009-AltinBEKOSSSMPR09a #experience #learning #student #tool support #user interface
Use of intuitive tools to enhance student learning and user experience (RA, MB, NE, CK, ÖCÖ, MS, HS, DS, CCM, CP, CRR), p. 365.
ITiCSEITiCSE-2009-BlasGMB #analysis #automation #composition #using
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSEITiCSE-2009-BrabrandD #taxonomy #using
Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
ITiCSEITiCSE-2009-Dooley #using
Peer assessments using the moodle workshop tool (JFD), p. 344.
ITiCSEITiCSE-2009-Draganova #learning #mobile
Use of mobile phone technologies in learning (CD), p. 399.
ITiCSEITiCSE-2009-EnglishR #assessment #automation #case study #source code #student #using
Evaluating students’ programs using automated assessment: a case study (JE, TR), p. 371.
ITiCSEITiCSE-2009-Fincher
Useful sharing (SF), p. 2.
ITiCSEITiCSE-2009-Garcia-MateosA #algorithm #data type #online #using
A course on algorithms and data structures using on-line judging (GGM, JLFA), pp. 45–49.
ITiCSEITiCSE-2009-Gomez-MartinJA #design pattern #education #game studies #product line #using
Teaching design patterns using a family of games (MAGM, GJD, JA), pp. 268–272.
ITiCSEITiCSE-2009-Kultur
Keeping the pace in CS-1 through the use of CMS (CK), p. 398.
ITiCSEITiCSE-2009-MaFRRW #modelling #using #visualisation
Improving the mental models held by novice programmers using cognitive conflict and jeliot visualisations (LM, JDF, MR, IR, MW), pp. 166–170.
ITiCSEITiCSE-2009-MoffatT #algorithm #education
The use of MUVE technology in teaching AI algorithms (DCM, KT), p. 396.
ITiCSEITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming #using
Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ITiCSEITiCSE-2009-Rubio-SanchezV #recursion #using
Tail recursion by using function generalization (MRS, JÁVI), p. 394.
ITiCSEITiCSE-2009-SoriaP #architecture #aspect-oriented #development #education #open source #using
Teaching software architectures and aspect-oriented software development using open-source projects (CCS, JP), p. 385.
ITiCSEITiCSE-2009-Steenkiste
The use of a controlled wireless testbed in courses (PS), pp. 80–84.
ITiCSEITiCSE-2009-Townsend #student #using
Using a groupware system in CS1 to engage introverted students (GCT), pp. 16–20.
ITiCSEITiCSE-2009-VillalobosCJ #interactive #learning #programming #using
Developing programming skills by using interactive learning objects (JV, NAC, CJ), pp. 151–155.
ESOPESOP-2009-Campbell #analysis #data type #memory management #using
Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
ESOPESOP-2009-MalayeriA #empirical #type system
Is Structural Subtyping Useful? An Empirical Study (DM, JA), pp. 95–111.
ESOPESOP-2009-Reynolds #category theory #design #programming language #using
Using Category Theory to Design Programming Languages (JCR), pp. 62–63.
FASEFASE-2009-AguirreFMMW #alloy #behaviour #specification #using
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
FASEFASE-2009-ChatterjeeJS #java #named #query #using
SNIFF: A Search Engine for Java Using Free-Form Queries (SC, SJ, KS), pp. 385–400.
FASEFASE-2009-KovacsV #array #invariant #proving #source code #theorem proving #using
Finding Loop Invariants for Programs over Arrays Using a Theorem Prover (LK, AV), pp. 470–485.
ICPCICPC-J-2008-HindleGH09 #complexity #rank #using
Reading beside the lines: Using indentation to rank revisions by complexity (AH, MWG, RCH), pp. 414–429.
CSMRCSMR-2009-BurenR #analysis #architecture #maintenance #using
Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMRCSMR-2009-Chikofsky #architecture #process #using
Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
CSMRCSMR-2009-FrankeJLUHEK #assessment #metric #network #using
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMRCSMR-2009-Gimnich #design #using
Using Existing Software Assets in SOA Design (RG), pp. 309–310.
CSMRCSMR-2009-Gyimothy #developer #metric #quality
To Use or Not to Use? The Metrics to Measure Software Quality (Developers’ View) (TG), pp. 3–4.
CSMRCSMR-2009-KpodjedoRGA #algorithm #evolution #question #using
Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla? (SK, FR, PG, GA), pp. 179–188.
CSMRCSMR-2009-PatelHR #clustering #dependence #dynamic analysis #using
Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
CSMRCSMR-2009-Rombach #design #maintenance #product line
Design for Maintenance — Use of Engineering Principles and Product Line Technology (HDR), pp. 1–2.
CSMRCSMR-2009-SoriaPC #architecture #fault #locality #modelling #tool support #using
Tool Support for Fault Localization Using Architectural Models (AS, JADP, MRC), pp. 59–68.
CSMRCSMR-2009-SoriaPC09a #architecture #aspect-oriented #configuration management #using
Handling the Dynamic Reconfiguration of Software Architectures Using Aspects (CCS, JP, JÁC), pp. 263–266.
ICPCICPC-2009-GueheneucKM #comprehension #using
Working session: Using eye-tracking to understand program comprehension (YGG, HHK, JIM), pp. 278–279.
ICPCICPC-2009-MurphyVS #behaviour #process #programming #using
Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
ICPCICPC-2009-StefikG #debugging #empirical #using
Using spoken text to aid debugging: An empirical study (AS, EG), pp. 110–119.
ICSMEICSM-2009-AlamAH #dependence #using
Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #risk management #using
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
ICSMEICSM-2009-DaraLLST #execution #testing #using
Using dynamic execution data to generate test cases (RD, SL, WL, ASG, LT), pp. 433–436.
ICSMEICSM-2009-DongG #comprehension #hybrid #using
Understanding source package organization using the hybrid model (XD, MWG), pp. 575–578.
ICSMEICSM-2009-DraganCM #using
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSMEICSM-2009-FerzundAW #classification #metric #using
Software change classification using hunk metrics (JF, SNA, FW), pp. 471–474.
ICSMEICSM-2009-FokaefsTCS #clustering #object-oriented #using
Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
ICSMEICSM-2009-GayHMM #concept #feedback #on the
On the use of relevance feedback in IR-based concept location (GG, SH, AM, TM), pp. 351–360.
ICSMEICSM-2009-HolmesCWD #case study #source code
The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSMEICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance #using
Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
ICSMEICSM-2009-Li #analysis #dependence #identification #using
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSMEICSM-2009-Poshyvanyk #information retrieval #maintenance #using
Using information retrieval to support software maintenance tasks (DP), pp. 453–456.
ICSMEICSM-2009-ShihabJH #developer #open source
Studying the use of developer IRC meetings in open source projects (ES, ZMJ, AEH), pp. 147–156.
ICSMEICSM-2009-ShternT #clustering #evaluation #using
Refining clustering evaluation using structure indicators (MS, VT), pp. 297–305.
ICSMEICSM-2009-VasaLBN #analysis #comparative #evolution #using
Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSMEICSM-2009-WitZD #clone tracking #using
Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSMEICSM-2009-YokomoriSNI #component #framework #impact analysis #ranking #using
Assessing the impact of framework changes using component ranking (RY, HPS, MN, KI), pp. 189–198.
ICSMEICSM-2009-Yoo #impact analysis #metric #performance #using
Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
ICSMEICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability #using
Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
MSRMSR-2009-EkanayakeTGB #concept #fault #predict #quality #using
Tracking concept drift of software projects using defect prediction quality (JE, JT, HCG, AB), pp. 51–60.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #using #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSRMSR-2009-LubsenZP #co-evolution #using
Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSRMSR-2009-MatterKN #debugging #developer #using
Assigning bug reports using a vocabulary-based expertise model of developers (DM, AK, ON), pp. 131–140.
MSRMSR-2009-ShihabJH #chat #developer #gnome #internet #on the
On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project (ES, ZMJ, AEH), pp. 107–110.
MSRMSR-2009-TianRP #automation #categorisation #using
Using Latent Dirichlet Allocation for automatic categorization of software (KT, MR, DP), pp. 163–166.
WCREWCRE-1999-CapobiancoLOPP99a #analysis #traceability #using
Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCREWCRE-1999-GatrellCH99a #c# #design pattern #replication #using
Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
WCREWCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
WCREWCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics #using
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
PEPMPEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPMPEPM-2009-SalamaMTGO #consistency #dependent type #using
Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions (CS, GM, WT, JG, JO), pp. 121–130.
PLDIPLDI-2009-AftandilianG #garbage collection #using
GC assertions: using the garbage collector to check heap properties (EA, SZG), pp. 235–244.
PLDIPLDI-2009-KunduTL #equivalence #optimisation #proving #using
Proving optimizations correct using parameterized program equivalence (SK, ZT, SL), pp. 327–337.
PLDIPLDI-2009-MehraraHHM #hardware #low cost #memory management #transaction #using
Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory (MM, JH, PCH, SAM), pp. 166–176.
PLDIPLDI-2009-RavitchJAL #automation #generative #library #static analysis #using
Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
PLDIPLDI-2009-SrivastavaG #abstraction #using #verification
Program verification using templates over predicate abstraction (SS, SG), pp. 223–234.
PLDIPLDI-2009-TorreMP #calculus #fixpoint #recursion #source code #using
Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
SASSAS-2009-DohKS #parsing #static analysis #string #using
Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
SASSAS-2009-Qadeer #algorithm #smt #using #verification
Algorithmic Verification of Systems Software Using SMT Solvers (SQ), p. 2.
SASSAS-2009-Simon #analysis #optimisation #pointer #similarity #using
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
STOCSTOC-2009-AndersenP #evolution #set #using
Finding sparse cuts locally using evolving sets (RA, YP), pp. 235–244.
STOCSTOC-2009-Gentry #encryption #using
Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
STOCSTOC-2009-Liu #algorithm #quantum #using
Quantum algorithms using the curvelet transform (YKL), pp. 391–400.
CIAACIAA-2009-AhnH #heuristic #implementation #using
Implementation of State Elimination Using Heuristics (JHA, YSH), pp. 178–187.
CIAACIAA-2009-Sastre-Martinez #network #parsing #performance #recursion #using
Efficient Parsing Using Filtered-Popping Recursive Transition Networks (JMSM), pp. 241–244.
ICALPICALP-v1-2009-Jansen #constant #scheduling #using
An EPTAS for Scheduling Jobs on Uniform Processors: Using an MILP Relaxation with a Constant Number of Integral Variables (KJ), pp. 562–573.
ICALPICALP-v1-2009-Nederlof #algorithm #performance #problem #using
Fast Polynomial-Space Algorithms Using Möbius Inversion: Improving on Steiner Tree and Related Problems (JN), pp. 713–725.
ICALPICALP-v2-2009-CooperIKK #graph #random #using
Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
LATALATA-2009-Blanchet-SadriMRW #algorithm #using #word
An Answer to a Conjecture on Overlaps in Partial Words Using Periodicity Algorithms (FBS, RM, AR, EW), pp. 188–199.
LATALATA-2009-Onodera #locality #using
New Morphic Characterizations of Languages in Chomsky Hierarchy Using Insertion and Locality (KO), pp. 648–659.
FMFM-2009-HjortRLPS #modelling #testing #user interface #using
Model-Based GUI Testing Using Uppaal at Novo Nordisk (UHH, JIR, KGL, MAP, AS), pp. 814–818.
FMFM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement #using
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FMFM-2009-JostLHSH #analysis #bound #using
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-LangM #composition #confluence #detection #partial order #reduction #using
Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
FMFM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight #using
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFMIFM-2009-SalaunB #algebra #encoding #process #using
Realizability of Choreographies Using Process Algebra Encodings (GS, TB), pp. 167–182.
SEFMSEFM-2009-BertoliniM #model checking #probability #testing #user interface #using
Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
SEFMSEFM-2009-HieronsJUY #adaptation #sequence #using
Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences (RMH, GVJ, HU, HY), pp. 157–166.
SEFMSEFM-2009-HummelT #behaviour #specification #using
Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
SEFMSEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing #using
Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
SEFMSEFM-2009-TruongTN #analysis #coordination #multi #using
Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFMSFM-2009-ClarkGT #analysis #using #web #web service
Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
CEFPCEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code #using
Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
ICFPICFP-2009-GazagnaireH #database #functional #named #performance #programming #transaction #using
OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons (TG, VH), pp. 203–214.
ICFPICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support #using
Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
ICFPICFP-2009-Pierce #education #programming language #proving #using
λ, the ultimate TA: using a proof assistant to teach programming language foundations (BCP), pp. 121–122.
GT-VMTGT-VMT-2009-MazanekM09a #diagrams #parsing #using
Contraction of Unconnected Diagrams using Least Cost Parsing (SM, MM), pp. 189–201.
CHICHI-2009-AokiHMMPSW #community #research #using
A vehicle for research: using street sweepers to explore the landscape of environmental community action (PMA, RJH, AMM, CM, EP, SS, AW), pp. 375–384.
CHICHI-2009-AppertZ #tool support #using
Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
CHICHI-2009-BaoG #what
What’s “this” you say?: the use of local references on distant displays (PB, DG), pp. 1029–1032.
CHICHI-2009-BergmanTBCW #using
It’s not that important: demoting personal information of low subjective importance using GrayArea (OB, ST, RBM, EC, SW), pp. 269–278.
CHICHI-2009-BighamC #interface
Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use (JPB, AC), pp. 1829–1838.
CHICHI-2009-BuntTL #research
Friend or foe?: examining CAS use in mathematics research (AB, MAT, EL), pp. 229–238.
CHICHI-2009-BuscherCM #eye tracking #predict #using #web #what
What do you see when you’re surfing?: using eye tracking to predict salient regions of web pages (GB, EC, MRM), pp. 21–30.
CHICHI-2009-FaureCR #tool support
Power tools for copying and moving: useful stuff for your desktop (GF, OC, NR), pp. 1675–1678.
CHICHI-2009-FeketeEG #named #using
Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
CHICHI-2009-FindlaterMMD #adaptation #performance
Ephemeral adaptation: the use of gradual onset to improve menu selection performance (LF, KM, JM, JQD), pp. 1655–1664.
CHICHI-2009-GeertsG #heuristic #social
Supporting the social uses of television: sociability heuristics for social tv (DG, DDG), pp. 595–604.
CHICHI-2009-Gerber #effectiveness #using
Using improvisation to enhance the effectiveness of brainstorming (EG), pp. 97–104.
CHICHI-2009-HaradaWMBL #learning #people
Longitudinal study of people learning to use continuous voice-based cursor control (SH, JOW, JM, JAB, JAL), pp. 347–356.
CHICHI-2009-HerringCKB #comprehension #design #exclamation #how #why
Getting inspired!: understanding how and why examples are used in creative design practice (SRH, CCC, JK, BPB), pp. 87–96.
CHICHI-2009-HongC #using
Annotate once, appear anywhere: collective foraging for snippets of interest using paragraph fingerprinting (LH, EHC), pp. 1791–1794.
CHICHI-2009-HornSCJ #education #programming language #visual notation
Comparing the use of tangible and graphical programming languages for informal science education (MSH, ETS, RJC, RJKJ), pp. 975–984.
CHICHI-2009-JakobsenH #source code #using #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHICHI-2009-KitturCS #topic #using #what #wiki
What’s in Wikipedia?: mapping topics and conflict using socially annotated category structure (AK, EHC, BS), pp. 1509–1512.
CHICHI-2009-KlasnjaCJGLPW #privacy #quote
“When I am on Wi-Fi, I am fearless”: privacy concerns & practices in everyday Wi-Fi use (PVK, SC, JJ, BG, LL, PP, DW), pp. 1993–2002.
CHICHI-2009-LawA #game studies #named #using
Input-agreement: a new mechanism for collecting data using human computation games (EL, LvA), pp. 1197–1206.
CHICHI-2009-MarshallFHRHRYD #interactive #physics #using
Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
CHICHI-2009-NylanderLB #internet #people #why
At home and with computer access: why and where people use cell phones to access the internet (SN, TL, AB), pp. 1639–1642.
CHICHI-2009-WonJH #using #visual notation #web
Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
CHICHI-2009-YamashitaIKI #multi #using
Difficulties in establishing common ground in multiparty groups using machine translation (NY, RI, HK, TI), pp. 679–688.
CHICHI-2009-YataniCJT #comprehension #development #diagrams #how #open source #why
Understanding how and why open source contributors use diagrams in the development of Ubuntu (KY, EC, CJ, KNT), pp. 995–1004.
CHICHI-2009-ZhouAZ #maintenance #why
I just don’t know why it’s gone: maintaining informal information use in inpatient care (XZ, MSA, KZ), pp. 2061–2070.
HCIDHM-2009-Butler #3d #using
Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
HCIDHM-2009-EllegastHS #assessment #using
Workload Assessment in Field Using the Ambulatory CUELA System (RPE, IH, CS), pp. 221–226.
HCIDHM-2009-FaustC #3d
3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
HCIDHM-2009-JeonJKH #classification #gender #using
Facial Gender Classification Using LUT-Based Sub-images and DIE (JBJ, SHJ, DJK, KSH), pp. 36–45.
HCIDHM-2009-McInnesSP #reliability #using
Within and Between-Subject Reliability Using Classic Jack for Ergonomic Assessments (BM, AS, JP), pp. 653–660.
HCIDHM-2009-PandithLD #evaluation #using
The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
HCIDHM-2009-SummerskillMCGSD #case study #evaluation #using #validation
Validation of the HADRIAN System Using an ATM Evaluation Case Study (SJS, RM, KC, DEG, RES, PD), pp. 727–736.
HCIHCD-2009-Bevan #framework #metric #quality #usability
Extending Quality in Use to Provide a Framework for Usability Measurement (NB), pp. 13–22.
HCIHCD-2009-CantoniBFB #human-computer #requirements #using
Playful Holistic Support to HCI Requirements Using LEGO Bricks (LC, LB, MF, DB), pp. 844–853.
HCIHCD-2009-ChuangO #correlation #design #mobile #using
A Photo Correlation Map Using Mobile AP II for Scenario-Based Design (YLC, MO), pp. 177–183.
HCIHCD-2009-Clark #adaptation
Engaging and Adaptive: Going beyond Ease of Use (KAC), pp. 46–54.
HCIHCD-2009-Go #design #question #usability #what
What Properties Make Scenarios Useful in Design for Usability? (KG), pp. 193–201.
HCIHCD-2009-HasanMP #e-commerce #usability #using
Using Google Analytics to Evaluate the Usability of E-Commerce Sites (LH, AM, SGP), pp. 697–706.
HCIHCD-2009-HashizumeKY #communication #difference
Regional Difference in the Use of Cell Phone and Other Communication Media among Senior Users (AH, MK, TY), pp. 426–435.
HCIHCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCD-2009-JonesND #information retrieval #set
Use of Nursing Management Minimum Data Set (NMMDS) for a Focused Information Retrieval (JFJ, ETN, CD), pp. 972–978.
HCIHCD-2009-MisawaF #case study #experience #generative #idea #user interface #using
A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCIHCD-2009-Rocker
Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments (CR), pp. 1052–1061.
HCIHCD-2009-Seland #design #game studies #mobile #using
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCIHCD-2009-ShibukawaFIN #effectiveness #using
Fundamental Studies on Effective e-Learning Using Physiology Indices (MS, MFF, YI, SPN), pp. 795–804.
HCIHCD-2009-Varsaluoma #evaluation #heuristic #mobile
Scenarios in the Heuristic Evaluation of Mobile Devices: Emphasizing the Context of Use (JV), pp. 332–341.
HCIHCD-2009-YuL #generative #idea #using
Facilitating Idea Generation Using Personas (DJY, WCL), pp. 381–388.
HCIHCI-AUII-2009-FanS #3d #navigation #user interface #using
Pull and Push: Proximity-Aware User Interface for Navigating in 3D Space Using a Handheld Camera (MF, YS), pp. 133–140.
HCIHCI-AUII-2009-IizukaAM #behaviour #using
The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
HCIHCI-AUII-2009-JeongSGKJ #using
Object Scanning Using a Sensor Frame (SJ, TS, GG, KHK, JWJ), pp. 433–439.
HCIHCI-AUII-2009-JiK #named #using
CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HCIHCI-AUII-2009-KimPS #3d #design
Menu Design in Cell Phones: Use of 3D Menus (KK, RWP, GS), pp. 48–57.
HCIHCI-AUII-2009-KubickiLLSKC #human-computer #interactive #using
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
HCIHCI-AUII-2009-LeeJLJCY #monitoring #smarttech #using
Wearable ECG Monitoring System Using Conductive Fabrics and Active Electrodes (SHL, SMJ, CKL, KSJ, GC, SKY), pp. 778–783.
HCIHCI-AUII-2009-MatsuiIK #image #recognition #using
Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing (TM, TI, YK), pp. 151–158.
HCIHCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi #using
Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCIHCI-AUII-2009-SungJC #metric #using
Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor (MS, KJ, GC), pp. 784–792.
HCIHCI-AUII-2009-TakadaOKT #navigation #smarttech #using
A Context-Aware AR Navigation System Using Wearable Sensors (DT, TO, KK, HT), pp. 793–801.
HCIHCI-AUII-2009-TokiwaYNSI #using
Motion Capture System Using an Optical Resolver (TT, MY, HN, MS, MI), pp. 536–543.
HCIHCI-NIMT-2009-BeinhauerH #evaluation #mobile #multimodal #using
Using Acoustic Landscapes for the Evaluation of Multimodal Mobile Applications (WB, CH), pp. 3–11.
HCIHCI-NIMT-2009-ChoumaneS #interactive #modelling #multimodal #using
Modeling and Using Salience in Multimodal Interaction Systems (AC, JS), pp. 12–18.
HCIHCI-NIMT-2009-Jain #human-computer #multimodal #using
Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
HCIHCI-NIMT-2009-KotaniYAH #representation #using
Representation of Velocity Information by Using Tactile Apparent Motion (KK, TY, TA, KH), pp. 470–478.
HCIHCI-NIMT-2009-KoudaKS #design #interface #using
Motion Stroke-A Tablet-Based Interface for Motion Design Tool Using Drawing (HK, IK, KS), pp. 821–829.
HCIHCI-NIMT-2009-MikhailAGSSE #communication #named #using
BEXPLORER: Computer and Communication Control Using EEG (MM, MAS, MG, NS, BS, KEA), pp. 579–587.
HCIHCI-NIMT-2009-MiwaIWIN
Shadow Awareness: Bodily Expression Supporting System with Use of Artificial Shadow (YM, SI, TW, KI, HN), pp. 226–235.
HCIHCI-NIMT-2009-OkitaNS #communication #using
Non-verbal Communication System Using Pictograms (MO, YN, HS), pp. 720–724.
HCIHCI-NIMT-2009-SadP09a #gesture #representation #using
Using Pictographic Representation, Syntactic Information and Gestures in Text Entry (HHS, FP), pp. 735–744.
HCIHCI-NIMT-2009-SanchezFFP #development #interface #using
Development of Symbiotic Brain-Machine Interfaces Using a Neurophysiology Cyberworkstation (JCS, RJOF, JABF, JCP), pp. 606–615.
HCIHCI-NIMT-2009-SchreiberWB #concept #interactive #using
New Interaction Concepts by Using the Wii Remote (MS, MvWM, RB), pp. 261–270.
HCIHCI-NIMT-2009-SuzukiMT #interactive #interface #using
Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
HCIHCI-NT-2009-AbeOO #automation #image #using
Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCIHCI-NT-2009-Bastide #integration #metamodelling
An Integration of Task and Use-Case Meta-models (RB), pp. 579–586.
HCIHCI-NT-2009-BeeldersBMD #interface #performance #prototype #using #word
Measuring User Performance for Different Interfaces Using a Word Processor Prototype (TRB, PJB, TM, ED), pp. 395–404.
HCIHCI-NT-2009-HaesenMLC #design #multi #using
Supporting Multidisciplinary Teams and Early Design Stages Using Storyboards (MH, JM, KL, KC), pp. 616–623.
HCIHCI-NT-2009-HermannJSS #internet #using
Acceptance of Future Technologies Using Personal Data: A Focus Group with Young Internet Users (FH, DJ, DS, AS), pp. 431–437.
HCIHCI-NT-2009-HuangLH #behaviour #interactive
E-Shopping Behavior and User-Web Interaction for Developing a Useful Green Website (FHH, YLL, SLH), pp. 446–454.
HCIHCI-NT-2009-KimWW #adaptation #parametricity #process #recognition #research #using
The Research on Adaptive Process for Emotion Recognition by Using Time-Dependent Parameters of Autonomic Nervous Response (JK, MCW, JW), pp. 77–84.
HCIHCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #using #virtual machine
Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
HCIHCI-NT-2009-OkuboF #development #estimation #using
Development of Estimation System for Concentrate Situation Using Acceleration Sensor (MO, AF), pp. 131–140.
HCIHCI-NT-2009-SuzukiMSANYF #estimation #on the #performance #using
On the Possibility about Performance Estimation Just before Beginning a Voluntary Motion Using Movement Related Cortical Potential (SS, TM, YS, KA, NN, TY, SF), pp. 184–191.
HCIHCI-VAD-2009-Al-NanihAO #approach #health #human-computer #information management #modelling
New Health Information Systems (HIS) Quality-in-Use Model Based on the GQM Approach and HCI Principles (RAN, HAN, OO), pp. 429–438.
HCIHCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability #using
Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
HCIHCI-VAD-2009-CasasOP #education #tablet #using
Using Tablet PCs and Pen-Based Technologies to Support Engineering Education (IC, SFO, JP), pp. 31–38.
HCIHCI-VAD-2009-MampadiCG #adaptation #hypermedia #information management #learning
The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems (FM, SYC, GG), pp. 156–165.
HCIHCI-VAD-2009-OHearB #enterprise #process #user interface #using
Using Activity Descriptions to Generate User Interfaces for ERP Software (TO, YB), pp. 577–586.
HCIHCI-VAD-2009-Sano #framework #using
A Proposal for a Framework for an e-Alumni Program Using SNS (HS), pp. 209–216.
HCIHIMI-DIE-2009-AnggreeniV #adaptation #design #framework
Supporting Scenario-Based Product Design and Its Adapters: An Informal Framework for Scenario Creation and Use (IA, MvdV), pp. 217–226.
HCIHIMI-DIE-2009-BrangierDE #analysis #integration #library
The 7 Basic Functions of a Digital Library — Analysis of Focus Groups about the Usefulness of a Thematic Digital Library on the History of European Integration (EB, JD, LE), pp. 345–354.
HCIHIMI-DIE-2009-HosonoMST #collaboration
Urgent Collaboration Service for Inclusive Use (NH, HM, MS, YT), pp. 49–58.
HCIHIMI-DIE-2009-KumeS #analysis #using #web
Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HCIHIMI-DIE-2009-LaquaiAPR #3d #interactive #multimodal #user interface #using
Using 3D Touch Interaction for a Multimodal Zoomable User Interface (FL, MA, TP, GR), pp. 543–552.
HCIHIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics #using
Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HCIHIMI-DIE-2009-MistrzykR #industrial #modelling
Practical Use of Task Models for Building and Modeling Operations Chart in the Industrial Production (TM, AR), pp. 140–148.
HCIHIMI-DIE-2009-NakagawaNM #using
Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
HCIHIMI-DIE-2009-Soderston #experience #tool support #user interface
A Retrospective and Prospective View of Information Technology Professionals’ Use of Tools: Maturing the User Experience (CS), pp. 306–315.
HCIHIMI-DIE-2009-SrinivasSPK #classification #feature model #performance #using
Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HCIHIMI-II-2009-HadaS #development #mobile #process #using
Development of an Annotation-Based Classroom Activities Support Environment Using Digital Appliance, Mobile Device and PC (YH, MS), pp. 642–649.
HCIHIMI-II-2009-HasegawaOWMM #estimation #mobile #using
Legible Character Size on Mobile Terminal Screens: Estimation Using Pinch-in/Out on the iPod Touch Panel (SH, MO, TW, SM, MM), pp. 395–402.
HCIHIMI-II-2009-ItoTHNYUST #human-computer #interface
Clinical Usefulness of Human-Computer Interface for Training Targeted Facial Expression: Application to Patients with Cleft Lip and/or Palate (KI, AT, SH, SN, MY, SU, NS, KT), pp. 513–521.
HCIHIMI-II-2009-KimMC #clustering #network #protocol #using
A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
HCIHIMI-II-2009-KimMPH #performance #using #visualisation
Efficient Annotation Visualization Using Distinctive Features (SKK, SHM, JP, SYH), pp. 295–303.
HCIHIMI-II-2009-LigdaJLJ #automation #distributed #tool support #using
Pilot Confidence with ATC Automation Using Cockpit Situation Display Tools in a Distributed Traffic Management Environment (SVL, NHJ, JL, WWJ), pp. 816–825.
HCIHIMI-II-2009-MilanovaKRTK #adaptation #image #representation #retrieval #using
Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation (MGM, RK, SHR, VT, RK), pp. 304–314.
HCIHIMI-II-2009-ReichlH #education #learning
Promoting a Central Learning Management System by Encouraging Its Use for Other Purposes Than Teaching (FR, AH), pp. 689–698.
HCIHIMI-II-2009-SawaragiIHN #approach #identification #using
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIHIMI-II-2009-SchwarzlerRWR #modelling #using #visual notation
Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System (SS, GR, FW, GR), pp. 201–209.
HCIHIMI-II-2009-WatanabeOHMM #mobile #using
Usefulness of Mobile Information Provision Systems Using Graphic Text -Visibility of Graphic Text on Mobile Phones (TW, MO, SH, SM, MM), pp. 476–485.
HCIHIMI-II-2009-YajimaSM #using
Remote Consultation System Using Hierarchically Structured Agents (HY, JS, KM), pp. 609–618.
HCIHIMI-II-2009-YangL #empirical #web
An Empirical Study the Effects of Language Factors on Web Site Use Intention (HJY, YLL), pp. 94–102.
HCIIDGD-2009-BoseS #hypermedia
The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
HCIIDGD-2009-EngleF #metric #multi #scalability #using
Rescaling Non-metric Data to Metric Data Using Multi-Dimensional Scaling (KME, GAF), pp. 245–253.
HCIIDGD-2009-PhukanR #eye tracking #usability #using
Considerations for Using Eye Trackers during Usability Studies (AP, MR), pp. 301–307.
HCIIDGD-2009-SwansonSG #framework #using
Exploring Cultural Context Using the Contextual Scenario Framework (ES, KS, JG), pp. 117–126.
HCIOCSC-2009-AndersenFLN #development #game studies #using
The Coming Revolution in Competence Development: Using Serious Games to Improve Cross-Cultural Skills (BA, MF, PL, VPN), pp. 413–422.
HCIOCSC-2009-BrandtzaegH #network #people #social #why
Why People Use Social Networking Sites (PBB, JH), pp. 143–152.
HCIOCSC-2009-ChaLHK #evaluation #using
User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence (JWC, HwL, YSH, LK), pp. 305–311.
HCIOCSC-2009-JohnsonB #community #wiki
Creating Community through the Use of a Class Wiki (KAJ, JB), pp. 471–478.
HCIOCSC-2009-KadenbachK #challenge #collaboration #development #education #social #using
Benefits and Challenges of Using Collaborative Development Environments with Social Software in Higher Computer Science Education (DK, CK), pp. 479–487.
HCIOCSC-2009-SongNKE #recommendation #using #word
A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
HCIOCSC-2009-TsuchihashiO #case study #interface #using
A Study on the Interface for Viewing the Information Menu of a Town from Intersections Using a Digital Compass (MT, KO), pp. 126–133.
AdaEuropeAdaEurope-2009-Montoya-DatoAG #ada #experience #online #programming #using
An Experience on Ada Programming Using On-Line Judging (FJMD, JLFA, GGM), pp. 75–89.
AdaSIGAda-2009-Barkstrom #ada #algorithm #concurrent #multi #on the #problem #using
On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms (BRB), pp. 61–72.
AdaSIGAda-2009-DelangePPKSK #simulation #using #validation
Validate, simulate, and implement ARINC653 systems using the AADL (JD, LP, AP, MK, FS, FK), pp. 31–44.
AdaSIGAda-2009-LosebyCB #embedded
Use of SPARK in a resource constrained embedded system (CL, PC, CB), pp. 87–90.
AdaSIGAda-2009-Sward09a #ada #using
Georegistration of imagery from unmanned aircraft systems using Ada (RES), pp. 121–126.
CAiSECAiSE-2009-GaillyP #modelling #ontology #standard #using
Using the REA Ontology to Create Interoperability between E-Collaboration Modeling Standards (FG, GP), pp. 395–409.
CAiSECAiSE-2009-GiachettiMP #automation #domain-specific language #generative #modelling #uml #using
Using UML as a Domain-Specific Modeling Language: A Proposal for Automatic Generation of UML Profiles (GG, BM, OP), pp. 110–124.
CAiSECAiSE-2009-KaiyaTSSK #analysis #quality #requirements #using
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSECAiSE-2009-LiuLYWH #analysis #constraints #using #verification #workflow
ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
CAiSECAiSE-2009-MaoBPF #automation #generative #using
Defining and Using Schematic Correspondences for Automatically Generating Schema Mappings (LM, KB, NWP, AAAF), pp. 79–93.
CAiSECAiSE-2009-SalayM #diagrams #quality #test coverage #using
Improving Model Quality Using Diagram Coverage Criteria (RS, JM), pp. 186–200.
CAiSECAiSE-2009-SalayME #megamodelling #modelling #using
Using Macromodels to Manage Collections of Related Models (RS, JM, SME), pp. 141–155.
EDOCEDOC-2009-BoukhebouzeABM #modelling #process #rule-based #using #verification
Rule-Based Modeling and Verification of Business Processes Using ECAPE Net (MB, YA, ANB, ZM), p. 74–?.
EDOCEDOC-2009-BucklEMRS #architecture #enterprise #using
Using Enterprise Architecture Management Patterns to Complement TOGAF (SB, AME, FM, RR, CMS), pp. 34–41.
ICEISICEIS-AIDSS-2009-CastroAP #approach #concept #implementation #metadata #named #using
K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
ICEISICEIS-AIDSS-2009-CastroO #multi #quality #using
Using Quality Costs in a Multi-agent System for an Airline Operations Control (AJMC, EO), pp. 19–24.
ICEISICEIS-AIDSS-2009-ChongC #using
An Investigation into Dynamic Customer Requirement using Computational Intelligence (YTC, CHC), pp. 113–117.
ICEISICEIS-AIDSS-2009-KhashmanD #image #network #using
Optimum DCT Compression of Medical Images using Neural Networks (AK, KD), pp. 90–95.
ICEISICEIS-AIDSS-2009-KuoWHH #clustering #network #optimisation #order #using
An Order Clustering System using ART2 Neural Network and Particle Swarm Optimization Methodn (RJK, MJW, TWH, TLH), pp. 54–59.
ICEISICEIS-AIDSS-2009-MarinicaOG #algorithm #mining #using
User-driven Association Rule Mining using a Local Algorithm (CM, AO, FG), pp. 200–205.
ICEISICEIS-AIDSS-2009-OReilly #algorithm #multi #optimisation #using
Frequency Assignment Optimization using the Swarm Intelligence Multi-agent based Algorithm (SIMBA) (GBO), pp. 25–32.
ICEISICEIS-AIDSS-2009-RaimbaultGL #diagrams #information management #uml #using
Using UML Class Diagram as a Knowledge Engineering Tool (TR, DG, SL), pp. 60–65.
ICEISICEIS-AIDSS-2009-RodriguesNCM #using
Estimating Greenhouse Gas Emissions using Computational Intelligence (JAPR, LBN, PHGC, JCCBSdM), pp. 248–250.
ICEISICEIS-AIDSS-2009-SunLTT #2d #invariant #recognition #using
Using GRA for 2D Invariant Object Recognition (THS, JCL, CHT, FCT), pp. 108–112.
ICEISICEIS-AIDSS-2009-TsengCH #approach #assembly #multi #sequence #using
A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
ICEISICEIS-DISI-2009-BergerS #architecture #case study #implementation #named #query
FedDW: A Tool for Querying Federations of Data Warehouses — Architecture, Use Case and Implementation (SB, MS), pp. 113–122.
ICEISICEIS-DISI-2009-GroppeGK #optimisation #using
Optimization of SPARQL by using coreSPARQL (JG, SG, JK), pp. 107–112.
ICEISICEIS-DISI-2009-GuerraBOSS #keyword #named #using
Keymantic: A Keyword-based Search Engine using Structural Knowledge (FG, SB, MO, AS, CS), pp. 241–246.
ICEISICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics #using
Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEISICEIS-DISI-2009-IskaniusHM #case study #enterprise #experience
Experiences of ERP use in Small Enterprises (PI, RH, MM), pp. 5–10.
ICEISICEIS-DISI-2009-MoserMBM #approach #integration #modelling #performance #requirements #semantics #using
Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
ICEISICEIS-DISI-2009-RomeuAC #integration #metric #using
Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEISICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #using #web
Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
ICEISICEIS-HCI-2009-NakanishiTO #artificial reality #complexity #design #effectiveness #guidelines #using #verification
Study for Establishing Design Guidelines for Manuals using Augmented Reality Technology — Verification and Expansion of the Basic Model Describing “Effective Complexity” (MN, SiT, YO), pp. 21–26.
ICEISICEIS-HCI-2009-NetoD #case study #gesture #scalability
A Study on the use of Gestures for Large Displays (AN, CD), pp. 55–60.
ICEISICEIS-ISAS-2009-CiaramellaCLM #agile #process #prototype #using
Using BPMN and Tracing for Rapid Business Process Prototyping Environments (AC, MGCAC, BL, FM), pp. 206–212.
ICEISICEIS-ISAS-2009-FerreiraCAB #modelling #requirements #using
Keeping the Rationale of IS Requirements using Organizational Business Models (JJF, VMC, RMdA, FAB), pp. 292–297.
ICEISICEIS-ISAS-2009-KinderenGA #modelling #multi #reasoning #using
Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models (SdK, JG, HA), pp. 131–136.
ICEISICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #using #xml
A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
ICEISICEIS-ISAS-2009-NascimentoITR #legacy #process #using
A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEISICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process #using
Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEISICEIS-J-2009-CallegariB #fuzzy #logic #multi #using
A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEISICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #safety #using
Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
ICEISICEIS-J-2009-GadK #clustering #performance #semantics #similarity #using
Enhancing Text Clustering Performance Using Semantic Similarity (WKG, MSK), pp. 325–335.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network #using
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEISICEIS-J-2009-NachevHS #fuzzy #network #predict #using
Insolvency Prediction of Irish Companies Using Backpropagation and Fuzzy ARTMAP Neural Networks (AN, SH, BS), pp. 287–298.
ICEISICEIS-J-2009-NollR #concept #traceability #using
Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
ICEISICEIS-J-2009-Sun #network #using
Stereo Matching Using Synchronous Hopfield Neural Network (THS), pp. 336–347.
ICEISICEIS-SAIC-2009-CernuzziZ #design #named #tool support #using
Gaia4E: A Tool Supporting the Design of MAS using Gaia (LC, FZ), pp. 82–88.
ICEISICEIS-SAIC-2009-CiuffoI #case study #collaboration #information management #recommendation #using
Using Grids to Support Information Filtering Systems — A Case Study of Running Collaborative Filtering Recommendations on gLite (LNC, EI), pp. 12–18.
ICEISICEIS-SAIC-2009-GandhiT #categorisation #email #ontology #using
Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEISICEIS-SAIC-2009-LeeLK #classification #using
Blog Classification using K-means (KJL, ML, WK), pp. 61–67.
CIKMCIKM-2009-AchananuparpYC #using
Using negative voting to diversify answers in non-factoid question answering (PA, CCY, XC), pp. 1681–1684.
CIKMCIKM-2009-AlgarniLXL #effectiveness #feedback #information management #using
An effective model of using negative relevance feedback for information filtering (AA, YL, YX, RYKL), pp. 1605–1608.
CIKMCIKM-2009-AlonsoGB #clustering #timeline #using
Clustering and exploring search results using timeline constructions (OA, MG, RABY), pp. 97–106.
CIKMCIKM-2009-AnastasakosHKR #approach #collaboration #graph #recommendation #using
A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
CIKMCIKM-2009-BalasubramanianC #automation #generative #modelling #topic #using
Automatic generation of topic pages using query-based aspect models (NB, SC), pp. 2049–2052.
CIKMCIKM-2009-BatalH #classification #using
Boosting KNN text classification accuracy by using supervised term weighting schemes (IB, MH), pp. 2041–2044.
CIKMCIKM-2009-BohmNPW #clustering #using
Density-based clustering using graphics processors (CB, RN, CP, BW), pp. 661–670.
CIKMCIKM-2009-CaoCCJZ #categorisation #modelling #retrieval
The use of categorization information in language models for question retrieval (XC, GC, BC, CSJ, CZ), pp. 265–274.
CIKMCIKM-2009-DasdanDKD #automation #interface #query #retrieval #using
Automatic retrieval of similar content using search engine query interface (AD, PD, SK, CD), pp. 701–710.
CIKMCIKM-2009-DengKL #retrieval #using
Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
CIKMCIKM-2009-FernandezL #retrieval #using
Using opinion-based features to boost sentence retrieval (RTF, DEL), pp. 1617–1620.
CIKMCIKM-2009-GurajadaK #clustering #maintenance #online #using
On-line index maintenance using horizontal partitioning (SG, PSK), pp. 435–444.
CIKMCIKM-2009-GwaderaC #mining #ranking #using
Mining and ranking streams of news stories using cross-stream sequential patterns (RG, FC), pp. 1709–1712.
CIKMCIKM-2009-HuSZC #clustering #semantics #using
Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
CIKMCIKM-2009-IslamI #set #using #web
Real-word spelling correction using Google web 1Tn-gram data set (AI, DI), pp. 1689–1692.
CIKMCIKM-2009-KatoOOT #query #relational #using #web
Query by analogical example: relational search using web search engine indices (MPK, HO, SO, KT), pp. 27–36.
CIKMCIKM-2009-KhareA #empirical #interface #markov #segmentation #using
An empirical study on using hidden markov model for search interface segmentation (RK, YA), pp. 17–26.
CIKMCIKM-2009-KimC #pseudo #retrieval #using
Retrieval experiments using pseudo-desktop collections (JK, WBC), pp. 1297–1306.
CIKMCIKM-2009-KobayakawaKTOKT #analysis #classification #kernel #using
Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKMCIKM-2009-KuttyNL #approach #clustering #documentation #named #using #xml
XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
CIKMCIKM-2009-LeeNL #approach #feedback #retrieval #using
An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
CIKMCIKM-2009-LeeVRKMI #adaptation #performance #topic #using
Measuring system performance and topic discernment using generalized adaptive-weight mean (CTL, VV, EMR, GK, NMF, AI), pp. 2033–2036.
CIKMCIKM-2009-LiuZ #classification #sentiment #using
Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKMCIKM-2009-LuHM #algorithm #approximate #performance #using
Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKMCIKM-2009-MabroukehE #mining #ontology #predict #semantics #using #web
Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
CIKMCIKM-2009-MaCQG #game studies #using
Improving search engines using human computation games (HM, RC, CQ, AG), pp. 275–284.
CIKMCIKM-2009-MartineauFJP #classification #difference #problem #using #word
Improving binary classification on text problems using differential word features (JM, TF, AJ, SP), pp. 2019–2024.
CIKMCIKM-2009-MouzaLRS #algebra #n-gram #named #string #using
AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
CIKMCIKM-2009-PanCASD #feature model #ranking #using
Feature selection for ranking using boosted trees (FP, TC, DA, FS, GD), pp. 2025–2028.
CIKMCIKM-2009-ParkG #automation #metric #realtime #towards #using
Towards real-time measurement of customer satisfaction using automatically generated call transcripts (YP, SCG), pp. 1387–1396.
CIKMCIKM-2009-ParkR #analysis #information retrieval #kernel #semantics #using
Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKMCIKM-2009-PuH #clustering #feedback #pseudo #semantics #using
Pseudo relevance feedback using semantic clustering in relevance language model (QP, DH), pp. 1931–1934.
CIKMCIKM-2009-RachakondaS #topic #using
Finding the topical anchors of a context using lexical cooccurrence data (ARR, SS), pp. 1741–1744.
CIKMCIKM-2009-RafieiL #query #using #web
Data extraction from the web using wild card queries (DR, HL), pp. 1939–1942.
CIKMCIKM-2009-SeoCS #community #concurrent #online #thread #using
Online community search using thread structure (JS, WBC, DAS), pp. 1907–1910.
CIKMCIKM-2009-VienVCYKC #kernel #locality #named #using #visualisation
VRIFA: a nonlinear SVM visualization tool using nomogram and localized radial basis function (LRBF) kernels (NAV, NHV, TC, HY, SK, BHC), pp. 2081–2082.
CIKMCIKM-2009-ViyanonM #database #detection #relational #similarity #using #xml
A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKMCIKM-2009-VriesKCC #array #robust #using
Robust record linkage blocking using suffix arrays (TdV, HK, SC, PC), pp. 305–314.
CIKMCIKM-2009-WangML #learning #programming #question #rank #search-based #using
Learning to rank using evolutionary computation: immune programming or genetic programming? (SW, JM, JL), pp. 1879–1882.
CIKMCIKM-2009-WimalasuriyaD #information management #multi #ontology #using
Using multiple ontologies in information extraction (DCW, DD), pp. 235–244.
CIKMCIKM-2009-WuCZZ #approach #definite clause grammar #learning #novel #rank #using
Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
CIKMCIKM-2009-WuTW #query #revisited #using #xml
Answering XML queries using materialized views revisited (XW, DT, WHW), pp. 475–484.
CIKMCIKM-2009-XiaYZ #automation #using #web
Automatic web data extraction using tree alignment (YX, HY, SZ), pp. 1645–1648.
CIKMCIKM-2009-XuFZH #feature model #orthogonal #using
To obtain orthogonal feature extraction using training data selection (YX, SF, JZ, OH), pp. 1819–1822.
CIKMCIKM-2009-YangXBHSY #case study #cumulative #generative #information retrieval #social #using
A study of information retrieval on accumulative social descriptions using the generation features (LY, SX, SB, DH, ZS, YY), pp. 721–730.
ECIRECIR-2009-Ailon #algorithm #linear #query #ranking #using
A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
ECIRECIR-2009-BolelliEG #detection #topic #using
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
ECIRECIR-2009-Efron #aspect-oriented #multi #query #using
Using Multiple Query Aspects to Build Test Collections without Human Relevance Judgments (ME), pp. 276–287.
ECIRECIR-2009-HalveyPHVHGJ #case study #difference #low level #metric #retrieval #using #video
Diversity, Assortment, Dissimilarity, Variety: A Study of Diversity Measures Using Low Level Features for Video Retrieval (MH, PP, DH, RV, FH, AG, JMJ), pp. 126–137.
ECIRECIR-2009-KarimzadehganWR #using
Enhancing Expert Finding Using Organizational Hierarchies (MK, RWW, MR), pp. 177–188.
ECIRECIR-2009-LlorenteR #automation #higher-order #image #statistics #using
Using Second Order Statistics to Enhance Automated Image Annotation (AL, SMR), pp. 570–577.
ECIRECIR-2009-MissenB #detection #semantics #using
Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
ECIRECIR-2009-WeerkampBR #email #information management #using
Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ECIRECIR-2009-YinSC #query #using
Query Expansion Using External Evidence (ZY, MS, NC), pp. 362–374.
ICMLICML-2009-CamposZJ #constraints #learning #network #using
Structure learning of Bayesian networks using constraints (CPdC, ZZ, QJ), pp. 113–120.
ICMLICML-2009-LiKZ #learning #using
Semi-supervised learning using label mean (YFL, JTK, ZHZ), pp. 633–640.
ICMLICML-2009-PlathTN #classification #image #multi #random #segmentation #using
Multi-class image segmentation using conditional random fields and global classification (NP, MT, SN), pp. 817–824.
ICMLICML-2009-RainaMN #learning #scalability #using
Large-scale deep unsupervised learning using graphics processors (RR, AM, AYN), pp. 873–880.
ICMLICML-2009-Schmidt #process #using
Function factorization using warped Gaussian processes (MNS), pp. 921–928.
ICMLICML-2009-TielemanH #performance #persistent #using
Using fast weights to improve persistent contrastive divergence (TT, GEH), pp. 1033–1040.
ICMLICML-2009-Toussaint #approximate #optimisation #using
Robot trajectory optimization using approximate inference (MT), pp. 1049–1056.
ICMLICML-2009-YiWSS #probability #using
Stochastic search using the natural gradient (YS, DW, TS, JS), pp. 1161–1168.
ICMLICML-2009-YuLZG #collaboration #parametricity #predict #random #scalability #using
Large-scale collaborative prediction using a nonparametric random effects model (KY, JDL, SZ, YG), pp. 1185–1192.
ICMLICML-2009-ZhanLLZ #learning #metric #using
Learning instance specific distances using metric propagation (DCZ, ML, YFL, ZHZ), pp. 1225–1232.
KDDKDD-2009-DundarHBRR #case study #dataset #detection #learning #using
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
KDDKDD-2009-FuxmanKGATS #automation #classification #using
Improving classification accuracy using automatically extracted training data (AF, AK, ABG, RA, PT, JCS), pp. 1145–1154.
KDDKDD-2009-JiYLZKY #interactive #using
Drosophila gene expression pattern annotation using sparse features and term-term interactions (SJ, LY, YXL, ZHZ, SK, JY), pp. 407–416.
KDDKDD-2009-Macskassy #empirical #graph #learning #metric #using
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
KDDKDD-2009-MakanjuZM #clustering #using
Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDDKDD-2009-MaunzHK #graph #mining #refinement #scalability #using
Large-scale graph mining using backbone refinement classes (AM, CH, SK), pp. 617–626.
KDDKDD-2009-PatnaikMSR #data mining #mining #using
Sustainable operation and management of data center chillers using temporal data mining (DP, MM, RKS, NR), pp. 1305–1314.
KDDKDD-2009-SatuluriP #clustering #community #graph #probability #scalability #using
Scalable graph clustering using stochastic flows: applications to community discovery (VS, SP), pp. 737–746.
KDDKDD-2009-VatturiW #detection #using
Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
KDDKDD-2009-XuYL #mining #using
Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
KDIRKDIR-2009-DuarteDRF #clustering #consistency #using
Cluster Ensemble Selection — Using Average Cluster Consistency (FJFD, JMMD, FR, ALNF), pp. 85–95.
KDIRKDIR-2009-FatemiPRS #concept #mining #retrieval #semantics #using #video
Using Association Rule Mining to Enrich Semantic Concepts for Video Retrieval (NF, FP, LER, AFS), pp. 119–126.
KDIRKDIR-2009-GoyalBM #query #using
Entailment of Causal Queries in Narratives using Action Language (PG, LB, TMM), pp. 112–118.
KDIRKDIR-2009-GuoK #ontology #using
Discovering Relationship Associations in Life Sciences using Ontology and Inference (WG, SBK), pp. 10–17.
KDIRKDIR-2009-KimRM #retrieval #semantics #using
A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KDIRKDIR-2009-KulkarniC #concept #semantics #using #word
Computation of the Semantic Relatedness between Words using Concept Clouds (SK, DC), pp. 183–188.
KDIRKDIR-2009-LamB #categorisation #invariant #multi #using
Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
KDIRKDIR-2009-WangVH #documentation #probability #retrieval #using
Document Retrieval using a Probabilistic Knowledge Model (SW, SV, MH), pp. 26–33.
KEODKEOD-2009-CeaGMS #development #ontology #using
Using Linguistic Patterns to Enhance Ontology Development (GAdC, AGP, EMP, MdCSF), pp. 206–213.
KEODKEOD-2009-HermidaRMP #case study #modelling #ontology #owl #reuse #uml
Reusing UML Class Models to Generate OWL Ontologies — A Use Case in the Pharmacotherapeutic Domain (JMH, MTRF, AM, MP), pp. 281–286.
KEODKEOD-2009-Hufflen #component #framework #non-functional #using
A Framework for Managing Components using Non-functional Properties (JMH), pp. 460–463.
KEODKEOD-2009-YiR #algorithm #clustering #ontology #using
Using a Clustering Algorithm for Domain Related Ontology Construction (HY, VJRS), pp. 336–341.
KEODKEOD-2009-ZghalKYN #composition #named #ontology #using
OACAS — Ontologies Alignment using Composition and Aggregation of Similarities (SZ, MK, SBY, EMN), pp. 233–238.
KMISKMIS-2009-AlvesM #correlation
Best use of Knowledge in a Space Program — Managing the Correlated Technologies (MBA, AMM), pp. 301–304.
KMISKMIS-2009-GallupMZRO #approach #collaboration #information management #self
Facilitating Decision Making, Re-use and Collaboration — A Knowledge Management Approach for System Self-Awareness (SPG, DJM, YZ, JR, CO), pp. 236–241.
KMISKMIS-2009-Kume #analysis #using #visual notation #web
Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
KMISKMIS-2009-MottaPR #case study #documentation #elicitation #requirements
User Goal-oriented Requirements Elicitation to Improve Acceptance and Use — A Case Study on Document Management (GM, GP, PR), pp. 153–160.
MLDMMLDM-2009-CelepcikayEO #dataset #using
Regional Pattern Discovery in Geo-referenced Datasets Using PCA (OUC, CFE, CO), pp. 719–733.
MLDMMLDM-2009-GadK #clustering #semantics #similarity #using
New Semantic Similarity Based Model for Text Clustering Using Extended Gloss Overlaps (WKG, MSK), pp. 663–677.
MLDMMLDM-2009-GoncalvesQ #classification #kernel #semantics #using
Using Graph-Kernels to Represent Semantic Information in Text Classification (TG, PQ), pp. 632–646.
MLDMMLDM-2009-KobayashiS #classification #distributed #linear #representation #using
A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDMMLDM-2009-NunesSP #detection #image #using
Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
MLDMMLDM-2009-QureshiZ #quality #using
Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
MLDMMLDM-2009-RiesenB #difference #graph #prototype #reduction #using
Dissimilarity Based Vector Space Embedding of Graphs Using Prototype Reduction Schemes (KR, HB), pp. 617–631.
MLDMMLDM-2009-SilvaSNPJN #classification #geometry #image #metric #using
Lung Nodules Classification in CT Images Using Simpson’s Index, Geometrical Measures and One-Class SVM (CAdS, ACS, SMBN, ACdP, GBJ, RAN), pp. 810–822.
RecSysRecSys-2009-Golbeck #recommendation #social #trust #tutorial #using
Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSysRecSys-2009-JamaliE #network #recommendation #trust #using
Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSysRecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust #using
FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSysRecSys-2009-PhelanMS #realtime #recommendation #topic #twitter #using
Using twitter to recommend real-time topical news (OP, KM, BS), pp. 385–388.
RecSysRecSys-2009-QuerciaC #mobile #named #recommendation #using
FriendSensing: recommending friends using mobile phones (DQ, LC), pp. 273–276.
RecSysRecSys-2009-UmyarovT #estimation #modelling #rating #recommendation #using
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models (AU, AT), pp. 37–44.
SEKESEKE-2009-AhsanFW #debugging #estimation #machine learning #using
Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKESEKE-2009-AndresMN #mining #realtime #testing #using
Using a Mining Frequency Patterns Model to Automate Passive Testing of Real-time Systems (CA, MGM, MN), pp. 426–431.
SEKESEKE-2009-FarZYA #concept #documentation #learning #semantics #using
Realization of Semantic Search Using Concept Learning and Document Annotation Agents (BHF, CZ, Z(Y, MA), pp. 164–169.
SEKESEKE-2009-GarlanCSBC #analysis #architecture #using
Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKESEKE-2009-HuangCPHP #automation #information management #using
Automated Nursing Knowledge Management Using Indexing (SH, SC, ASP, SH, MP), pp. 93–96.
SEKESEKE-2009-LemkeR #framework #using
Using Knowledge Objects to Exchange Knowledge in a MAS Platform (APL, MBR), pp. 206–211.
SEKESEKE-2009-PengLPF #algorithm #requirements #using
Requirements Discovery Based on RGPS Using Evolutionary Algorithm (TP, BL, WP, ZF), pp. 286–290.
SEKESEKE-2009-PortoMF #comprehension #visualisation
The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
SEKESEKE-2009-RusNSC #algorithm #clustering #fault #graph #using
Clustering of Defect Reports Using Graph Partitioning Algorithms (VR, XN, SGS, YC), pp. 442–445.
SEKESEKE-2009-WilliamsR #risk management #statistics #using
Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIRSIGIR-2009-ArampatzisKR #optimisation #using
Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
SIGIRSIGIR-2009-BolourianMR #named #quantifier #topic #using
SugarCube: quantification of topic propagation in the blogosphere using percolation theory (AAB, YM, CJvR), pp. 786–787.
SIGIRSIGIR-2009-Bossard #automation #documentation #summary #using
Using document structure for automatic summarization (AB), p. 849.
SIGIRSIGIR-2009-BrunoM #approach #clustering #modelling #multi #using
Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
SIGIRSIGIR-2009-CarmelRZ #clustering #using #wiki
Enhancing cluster labeling using wikipedia (DC, HR, NZ), pp. 139–146.
SIGIRSIGIR-2009-Collins-ThompsonB #performance #predict #query #using
Estimating query performance using class predictions (KCT, PNB), pp. 672–673.
SIGIRSIGIR-2009-DouSNW #using #web
Using anchor texts with their hyperlink structure for web search (ZD, RS, JYN, JRW), pp. 227–234.
SIGIRSIGIR-2009-GuanBMCW #graph #multi #personalisation #ranking #recommendation #using
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects (ZG, JB, QM, CC, CW), pp. 540–547.
SIGIRSIGIR-2009-ItakuraC #detection #markov #using #wiki
Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
SIGIRSIGIR-2009-KapteinKK #ad hoc #category theory #using #wiki
Using wikipedia categories for ad hoc search (RK, MK, JK), pp. 824–825.
SIGIRSIGIR-2009-KeikhaCC #random #using
Blog distillation using random walks (MK, MJC, FC), pp. 638–639.
SIGIRSIGIR-2009-KumaranC #predict #quality #query #using
Reducing long queries using query quality predictors (GK, VRC), pp. 564–571.
SIGIRSIGIR-2009-LeeLP #reduction #similarity #using
Tag-based object similarity computation using term space dimension reduction (YKL, SJL, JP), pp. 790–791.
SIGIRSIGIR-2009-Liu #community #ranking #using
Using computational community interest as an indicator for ranking (XL), p. 851.
SIGIRSIGIR-2009-Liu09a #information retrieval #personalisation #topic #using
Personalizing information retrieval using task features, topic knowledge, and task product (JL), p. 855.
SIGIRSIGIR-2009-MacdonaldW
Usefulness of click-through data in expert search (CM, RWW), pp. 816–817.
SIGIRSIGIR-2009-MaCQG #game studies #using
Page hunt: improving search engines using human computation games (HM, RC, CQ, AG), pp. 746–747.
SIGIRSIGIR-2009-McDougallM #using
Expertise search in academia using facets (DM, CM), p. 834.
SIGIRSIGIR-2009-MetzlerNCR #documentation #using
Building enriched document representations using aggregated anchor text (DM, JN, HC, SR), pp. 219–226.
SIGIRSIGIR-2009-NohPYLP #automation #folksonomy #multi #network #using
An automatic translation of tags for multimedia contents using folksonomy networks (TGN, SBP, HGY, SJL, SYP), pp. 492–499.
SIGIRSIGIR-2009-OulasvirtaHS
When more is less: the paradox of choice in search engine use (AO, JPH, BS), pp. 516–523.
SIGIRSIGIR-2009-PunithaJG #automation #feature model #multi #query #retrieval #topic #using #video
Topic prerogative feature selection using multiple query examples for automatic video retrieval (PP, JMJ, AG), pp. 804–805.
SIGIRSIGIR-2009-RavanaPM #using
System scoring using partial prior information (SDR, LAFP, AM), pp. 788–789.
SIGIRSIGIR-2009-SeoJ #graph #precise #retrieval #using
High precision retrieval using relevance-flow graph (JS, JJ), pp. 694–695.
SIGIRSIGIR-2009-SiersdorferPS #automation #using #video
Automatic video tagging using content redundancy (SS, JSP, MS), pp. 395–402.
SIGIRSIGIR-2009-SubramaniamSDV #fuzzy #similarity #string #using
Experiments in CLIR using fuzzy string search based on surface similarity (SS, AKS, PD, VV), pp. 682–683.
SIGIRSIGIR-2009-TomasikTT #classification #image #using
Tagging products using image classification (BT, PT, DT), pp. 792–793.
SIGIRSIGIR-2009-WangLF #automation #fuzzy #predict #using
Automatic URL completion and prediction using fuzzy type-ahead search (JW, GL, JF), pp. 634–635.
SIGIRSIGIR-2009-XuM #using #web
Evaluating web search using task completion time (YX, DM), pp. 676–677.
SIGIRSIGIR-2009-YehK #documentation #image #using
Searching documentation using text, OCR, and image (TY, BK), pp. 776–777.
ECMFAECMDA-FA-2009-EvansFM #case study #eclipse #experience #modelling #network #using
Experiences of Developing a Network Modeling Tool Using the Eclipse Environment (AE, MAF, PM), pp. 301–312.
ECMFAECMDA-FA-2009-KublerG #approach #mining #qvt #using
A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
ECMFAECMDA-FA-2009-TisiJFCB #higher-order #model transformation #on the
On the Use of Higher-Order Model Transformations (MT, FJ, PF, SC, JB), pp. 18–33.
ICMTICMT-2009-AmstelLB #asf+sdf #metric #model transformation #quality #using
Using Metrics for Assessing the Quality of ASF+SDF Model Transformations (MvA, CFJL, MvdB), pp. 239–248.
ICMTICMT-2009-FabroABJ #model transformation #using
Achieving Rule Interoperability Using Chains of Model Transformations (MDDF, PA, JB, FJ), pp. 249–259.
MODELSMoDELS-2009-DrusinskyS #logic #uml #using
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards #using
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing #using
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics #using
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing #using
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt #using
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
MODELSMoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
MODELSMoDELS-2009-DrusinskyS #logic #uml #using
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards #using
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing #using
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics #using
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing #using
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt #using
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
MODELSMoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
ECOOPECOOP-2009-CutsemBDM #using
Adding State and Visibility Control to Traits Using Lexical Nesting (TVC, AB, SD, WDM), pp. 220–243.
ECOOPECOOP-2009-HeydarnooriCB #automation #concept #framework
Supporting Framework Use via Automatically Extracted Concept-Implementation Templates (AH, KC, TTB), pp. 344–368.
ECOOPECOOP-2009-XuRS #alias #analysis #points-to #scalability #using
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLAOOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime #using
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
TOOLSTOOLS-EUROPE-2009-BruniV #generative #named #prototype #using #virtual machine
PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy (CB, TV), pp. 328–347.
TOOLSTOOLS-EUROPE-2009-SadilekW #grammarware #semantics #using
Using Grammarware Languages to Define Operational Semantics of Modelled Languages (DAS, GW), pp. 348–356.
TOOLSTOOLS-EUROPE-2009-StrickerHS #constraints #design #diagrams #uml #using
Designing Design Constraints in the UML Using Join Point Designation Diagrams (VS, SH, DS), pp. 57–76.
GPCEGPCE-2009-Nikhil #design #hardware #using
Using GPCE principles for hardware systems and accelerators: (bridging the gap to HW design) (RSN), pp. 1–2.
LOPSTRLOPSTR-2009-AstefanoaeiBR #testing #using
Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
LOPSTRLOPSTR-2009-CzenkoE #flexibility #using
LP with Flexible Grouping and Aggregates Using Modes (MC, SE), pp. 67–81.
LOPSTRLOPSTR-2009-ScandoloKH #parallel #pipes and filters #using
Program Parallelization Using Synchronized Pipelining (LS, CK, MVH), pp. 173–187.
PADLPADL-2009-MaldeO #analysis #haskell #scalability #sequence #using
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
POPLPOPL-2009-BrunelDHLM #logic #model checking #using
A foundation for flow-based program matching: using temporal logic and model checking (JB, DD, RRH, JLL, GM), pp. 114–126.
RERE-2009-AdamDEG #requirements #using
Using Task-oriented Requirements Engineering in Different Domains (SA, JD, ME, AG), pp. 267–272.
RERE-2009-CarvalloF #component #on the #process #requirements
On the Use of Requirements for Driving Call-for-Tender Processes for Procuring Coarse-grained OTS Components (JPC, XF), pp. 287–292.
RERE-2009-GrossD #diagrams #process #requirements #uml
EPC vs. UML Activity Diagram — Two Experiments Examining their Usefulness for Requirements Engineering (AG, JD), pp. 47–56.
RERE-2009-KonradD #industrial #lessons learnt #modelling
Lessons Learned from the Use of Artifact Models in Industrial Projects (SK, HD), pp. 349–354.
RERE-2009-OmoronyiaSRFW #case study #developer #navigation #source code #traceability
Use Case to Source Code Traceability: The Developer Navigation View Point (IO, GS, MR, JDF, MW), pp. 237–242.
RERE-2009-TunJLNY #problem #using
Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
RERE-2009-WangZZJM #approach #case study #feature model #modelling
A Use Case Based Approach to Feature Models’ Construction (BW, WZ, HZ, ZJ, HM), pp. 121–130.
SACSAC-2009-Abbadeni #database #information retrieval #multi #query #using #visual notation
Information retrieval from visual databases using multiple representations and multiple queries (NA), pp. 1523–1527.
SACSAC-2009-BaechlerBH #image #modelling #using #verification
Labeled images verification using Gaussian mixture models (MB, JLB, JH), pp. 1331–1335.
SACSAC-2009-BreauxLOA #identification #requirements #using
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-BuresHM #component #product line #using
Using a product line for creating component systems (TB, PH, MM), pp. 501–508.
SACSAC-2009-CaldersGPR #mining #process #using
Using minimum description length for process mining (TC, CWG, MP, AR), pp. 1451–1455.
SACSAC-2009-CasadeiV #design #model checking #probability #self #simulation #using
Using probabilistic model checking and simulation for designing self-organizing systems (MC, MV), pp. 2103–2104.
SACSAC-2009-ChunLSC #multi #predict #using #video
An enhanced multi-view video compression using the constrained inter-view prediction (SC, SL, KS, KC), pp. 1811–1815.
SACSAC-2009-DaiMSZ #concept analysis #towards #using
Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
SACSAC-2009-DaoudTBC #ontology #personalisation #using
A session based personalized search using an ontological user profile (MD, LTL, MB, BC), pp. 1732–1736.
SACSAC-2009-DelicatoSPOBP #adaptation #aspect-oriented #composition #mobile #using
Using aspects and dynamic composition to provide context-aware adaptation for mobile applications (FCD, ILAS, PFP, ALSO, TVB, LP), pp. 456–460.
SACSAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing #using
TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
SACSAC-2009-EsfahaniMSU #mining #process #using
Using process mining to business process distribution (FSE, MAAM, MNS, NIU), pp. 2140–2145.
SACSAC-2009-FilhoNLA #framework #memory management #mobile #using #visualisation
A framework for text visualization using memory traffic management for mobile devices (JBFF, JdSRN, CRFL, RMCA), pp. 1847–1848.
SACSAC-2009-FloraTB #forensics #identification #image #using
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-GonzalesLL #community #online #requirements #using
Requirements engineering using appreciative inquiry for an online community of caregivers of children with autism (CHG, GL, GDL), pp. 142–146.
SACSAC-2009-HalleV #monitoring #runtime #streaming #using #web #web service #xml
Runtime monitoring of web service choreographies using streaming XML (SH, RV), pp. 2118–2125.
SACSAC-2009-HarshN #multi #using
Using geo-spatial session tagging for smart multicast session discovery (PH, REN), pp. 22–27.
SACSAC-2009-HijikataHON #algorithm #analysis #using
HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-HuangSMZH #approach #using
A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
SACSAC-2009-JeschkePV #development #using #web
Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
SACSAC-2009-LimaH #approach #using
Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
SACSAC-2009-LindvallFKCJ #network #semantics #using
Searching for relevant software change artifacts using semantic networks (ML, RLF, GK, ZC, VPJ), pp. 496–500.
SACSAC-2009-LiuDSYH #algorithm #classification #image #invariant #using
A new K-View algorithm for texture image classification using rotation-invariant feature (HL, SD, ES, CY, CCH), pp. 914–921.
SACSAC-2009-LiuTS #classification #complexity #learning #using
Assessing complexity of service-oriented computing using learning classifier systems (LL, ST, HS), pp. 2170–2171.
SACSAC-2009-LuYLELW #correlation #data type #detection #incremental #using
Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
SACSAC-2009-MacielH #architecture #rest #transaction #using
An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
SACSAC-2009-MagaudNS #coq #formal method #theorem #using
Formalizing Desargues’ theorem in Coq using ranks (NM, JN, PS), pp. 1110–1115.
SACSAC-2009-MarquesF #documentation #using
Reconstructing strip-shredded documents using color as feature matching (MAOM, COAF), pp. 893–894.
SACSAC-2009-MartinsHM #image #multi #re-engineering #using
Super-resolution image reconstruction using the generalized isotropic multi-level logistic model (ALDM, MRPH, NDAM), pp. 934–938.
SACSAC-2009-MattheT #query #using
Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degrees (TM, GDT), pp. 1699–1703.
SACSAC-2009-MoallemL #distributed #grid #scheduling #using
Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
SACSAC-2009-NetoFP #named #people #using
MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasks (FGdON, JMF, RRGP), pp. 158–159.
SACSAC-2009-OlowoyeyeTF #segmentation #using
Medical volume segmentation using bank of Gabor filters (AO, MT, SF), pp. 826–829.
SACSAC-2009-PaganoPL #multi #realtime #using
Real-time multi-view vision systems using WSNs (PP, FP, YL), pp. 2191–2196.
SACSAC-2009-ParkH #embedded #fine-grained #operating system #programming #using
Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environment (JP, SH), pp. 1952–1956.
SACSAC-2009-ParkKLKK #network #realtime #using
A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networks (HP, MK, SL, SK, YK), pp. 196–200.
SACSAC-2009-ParkPR #algorithm #automation #using
Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithms (KP, TP, KRR), pp. 1098–1105.
SACSAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation #using
A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
SACSAC-2009-PassitoMM #analysis #network #protocol #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-PostarnakevichS #modelling #representation #using #visualisation
Global-to-local representation and visualization of molecular surfaces using deformable models (NP, RS), pp. 782–787.
SACSAC-2009-RamanathanRG #framework #people #process #trade-off #using
The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvement (JR, RR, RG), pp. 259–264.
SACSAC-2009-RodriguesSC #composition #embedded #functional #set #using #verification
Improving functional verification of embedded systems using hierarchical composition and set theory (CLR, KRGdS, HdNC), pp. 1632–1636.
SACSAC-2009-RyuKC #algorithm #detection #documentation #evolution #using
A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
SACSAC-2009-SchmidtSS #approach #personalisation #social #using #web
Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
SACSAC-2009-ShaLW #classification #using #visual notation
Foreground classification using active template in the scene context for visual surveillance (XS, XL, JW), pp. 943–944.
SACSAC-2009-SherminO #network #using
Using dynamic bayesian networks to infer gene regulatory networks from expression profiles (AS, MAO), pp. 799–803.
SACSAC-2009-SinnigCK #automaton #case study #lts #modelling #semantics
LTS semantics for use case models (DS, PC, FK), pp. 365–370.
SACSAC-2009-TanakaKTN #navigation #predict #using
A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SACSAC-2009-TarratacaSC #gesture #recognition #smarttech #using
The current feasibility of gesture recognition for a smartphone using J2ME (LT, ACS, JMPC), pp. 1642–1649.
SACSAC-2009-TokoroTT #smarttech #using
A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SACSAC-2009-YounM #email #ontology #personalisation #using
Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
ESEC-FSEESEC-FSE-2009-MaiaKUM #modelling #probability #refinement #towards #using
Towards accurate probabilistic models using state refinement (PHMM, JK, SU, NCM), pp. 281–284.
ESEC-FSEESEC-FSE-2009-VangalaCT #clustering #comparison #execution #testing #using
Test case comparison and clustering using program profiles and static execution (VV, JC, PT), pp. 293–294.
ICSEICSE-2009-CalinescuK #analysis #using
Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSEICSE-2009-CasoBGU #abstraction #contract #finite #using #validation
Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
ICSEICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering #using
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSEICSE-2009-Hassan #complexity #fault #predict #using
Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSEICSE-2009-MenziesWBH #how #probability #process #using
How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
ICSEICSE-2009-MorinBNJ #adaptation #aspect-oriented #modelling #using
Taming Dynamically Adaptive Systems using models and aspects (BM, OB, GN, JMJ), pp. 122–132.
ICSEICSE-2009-SantelicesJYH #lightweight #multi #using
Lightweight fault-localization using multiple coverage types (RAS, JAJ, YY, MJH), pp. 56–66.
ICSEICSE-2009-WeimerNGF #automation #programming #search-based #using
Automatically finding patches using genetic programming (WW, TN, CLG, SF), pp. 364–374.
ICSEICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social #using
Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
LDTALDTA-2008-FokkerS09 #abstract interpretation #attribute grammar #functional #source code #using
Abstract Interpretation of Functional Programs using an Attribute Grammar System (JF, SDS), pp. 117–133.
SPLCSPLC-2009-SchmidL #optimisation #product line #using
Introducing and optimizing software product lines using the FEF (KS, FvdL), p. 311.
SPLCSPLC-2009-Voelter #domain-specific language #product line #using
Using domain specific languages for product line engineering (MV), p. 329.
ASPLOSASPLOS-2009-CaulfieldGS #clustering #data-driven #memory management #named #performance #power management #using
Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications (AMC, LMG, SS), pp. 217–228.
ASPLOSASPLOS-2009-SidiroglouLPVNK #automation #named #self #using
ASSURE: automatic software self-healing using rescue points (SS, OL, CP, NV, JN, ADK), pp. 37–48.
CCCC-2009-AbadiBHHI #implementation #memory management #transaction
Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
HPCAHPCA-2009-PowellBEMSY #named #parametricity #runtime #using
CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
HPCAHPCA-2009-ReddiGHWSB #predict #using
Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
HPDCHPDC-2009-AssuncaoCB #capacity #clustering #in the cloud #using
Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters (MDdA, AdC, RB), pp. 141–150.
HPDCHPDC-2009-HironakaST #concurrent #performance #using
High performance wide-area overlay using deadlock-free routing (KH, HS, KT), pp. 81–90.
HPDCHPDC-2009-Reeuwijk #data flow #framework #learning #named #peer-to-peer #self #using
Maestro: a self-organizing peer-to-peer dataflow framework using reinforcement learning (CvR), pp. 187–196.
ISMMISMM-2009-GuanSJ #performance #policy #using
Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
ISMMISMM-2009-JulaR #locality #memory management
Two memory allocators that use hints to improve locality (AJ, LR), pp. 109–118.
ISMMISMM-2009-NaeemL #alias #analysis #performance #set #using
Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMMISMM-2009-SerranoZ #garbage collection #optimisation #using
Placement optimization using data context collected during garbage collection (MJS, XZ), pp. 69–78.
PPoPPPPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction #using
Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
PPoPPPPoPP-2009-LiBH #distributed #multi #performance #scalability #scheduling #using
Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin (TL, DPB, SH), pp. 65–74.
PPoPPPPoPP-2009-ZyulkyarovGUCAHV #game studies #interactive #memory management #multi #transaction #using
Atomic quake: using transactional memory in an interactive multiplayer game server (FZ, VG, OSÜ, AC, EA, TH, MV), pp. 25–34.
SOSPSOSP-2009-DunaganZS #combinator #graph #named #optimisation #using
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
CAVCAV-2009-BeerBCOT #using
Explaining Counterexamples Using Causality (IB, SBD, HC, AO, RJT), pp. 94–108.
CAVCAV-2009-DangS #image #polynomial #using
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion (TD, DS), pp. 219–232.
CAVCAV-2009-GuernicG #analysis #hybrid #reachability #using
Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAVCAV-2009-LahiriQR #concurrent #detection #fault #precise #smt #using
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
CAVCAV-2009-MajumdarX #testing #using
Reducing Test Inputs Using Information Partitions (RM, RGX), pp. 555–569.
CAVCAV-2009-Monniaux #float #linear #on the #using
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure (DM), pp. 570–583.
CAVCAV-2009-VerdoolaegeJB #equivalence #source code #using
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences (SV, GJ, MB), pp. 599–613.
CSLCSL-2009-GaboardiP #bound #semantics #using
Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
ICLPICLP-2009-BroechelerSS #logic programming #probability #query #source code #using
Using Histograms to Better Answer Queries to Probabilistic Logic Programs (MB, GIS, VSS), pp. 40–54.
ICLPICLP-2009-ChristiansenG
Non-discriminating Arguments and Their Uses (HC, JPG), pp. 55–69.
ICLPICLP-2009-Mungall #case study #experience #logic programming #using
Experiences Using Logic Programming in Bioinformatics (CM), pp. 1–21.
ICLPICLP-2009-PaluDPR #constraints #lazy evaluation #programming #set #using
Answer Set Programming with Constraints Using Lazy Grounding (ADP, AD, EP, GR), pp. 115–129.
ICLPICLP-2009-Raiser #constraints #graph transformation #research #summary #using
Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (Research Summary) (FR), pp. 540–541.
ICLPICLP-2009-Todorova #natural language #prolog #using
Answering Questions from Natural Language Using A-Prolog (YT), pp. 544–546.
ICLPICLP-2009-Wielemaker #prolog #using #web
Enabling Serendipitous Search on the Web of Data Using Prolog (JW), p. 36.
ICSTICST-2009-AlmeidaAM #approach #case study #estimation
An Alternative Approach to Test Effort Estimation Based on Use Cases (ERCdA, BTdA, RLdOM), pp. 279–288.
ICSTICST-2009-BandyopadhyayG #generative #modelling #sequence #state machine #uml #using
Test Input Generation Using UML Sequence and State Machines Models (AB, SG), pp. 121–130.
ICSTICST-2009-KaminskiA #detection #fault #logic #testing #using
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
ICSTICST-2009-KaminskiA09a #fault #logic #mutation testing #performance #testing #using
Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing (GKK, PA), pp. 386–395.
ICSTICST-2009-MurphyKVC #approach #assurance #quality #testing #using
Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
ICSTICST-2009-MurphySK #ml #runtime #testing #using
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles (CM, KS, GEK), pp. 436–445.
ICSTICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving #using
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage #using
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #identification #mining #using
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTAISSTA-2009-ClauseO #automation #identification #named #using
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTAISSTA-2009-ZhangHGXM #integer #linear #programming #testing #using
Time-aware test-case prioritization using integer linear programming (LZ, SSH, CG, TX, HM), pp. 213–224.
LICSLICS-2009-BokerK #automaton
Co-ing Büchi Made Tight and Useful (UB, OK), pp. 245–254.
MBTMBT-2009-DadeauLH #automaton #generative #on the #random #testing
On the Use of Uniform Random Generation of Automata for Testing (FD, JL, PCH), pp. 37–51.
MBTMBT-2009-SchumannSH #graph #nondeterminism #testing #using
Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs (AS, MS, JH), pp. 87–99.
ICSTSAT-2009-BonetJ #metric #satisfiability #using
Efficiently Calculating Evolutionary Tree Measures Using SAT (MLB, KSJ), pp. 4–17.
ICSTSAT-2009-HaimW #machine learning #using
Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
ICSTSAT-2009-KojevnikovKY #performance #using
Finding Efficient Circuits Using SAT-Solvers (AK, ASK, GY), pp. 32–44.
FATESTestCom-FATES-2009-AdjirSR #realtime #testing #using
Testing Real-Time Systems Using TINA (NA, PdSS, KMR), pp. 1–15.
FATESTestCom-FATES-2009-ErnitsRJV #modelling #testing #using #web
Model-Based Testing of Web Applications Using NModel (JPE, RR, JJ, MV), pp. 211–216.
FATESTestCom-FATES-2009-SubramaniamXGP #approach #proving #testing #theorem proving #using
An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
TLCATLCA-2009-Atkey #for free #parametricity #representation #syntax #using
Syntax for Free: Representing Syntax with Binding Using Parametricity (RA), pp. 35–49.
VMCAIVMCAI-2009-KiddRDV #debugging #random #using
Finding Concurrency-Related Bugs Using Random Isolation (NK, TWR, JD, MV), pp. 198–213.
VMCAIVMCAI-2009-TalyGT #constraints #logic #theorem proving #using
Synthesizing Switching Logic Using Constraint Solving (AT, SG, AT), pp. 305–319.
VMCAIVMCAI-2009-WimmerBB #bound #generative #markov #model checking #using
Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
CBSECBSE-2008-KuperbergKR #behaviour #black box #component #modelling #parametricity #performance #predict #using
Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
ECSAECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology #using
Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
ECSAECSA-2008-FilhoCNOLAM #bibliography #design #perspective #using
Evaluating Domain Design Approaches Using Systematic Review (EDdSF, RdOC, DFSN, THBdO, LBL, ESdA, SRdLM), pp. 50–65.
ECSAECSA-2008-KamalA #behaviour #design pattern #modelling #using
Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
ECSAECSA-2008-NavarroC #approach #architecture #automation #design #using
Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
ECSAECSA-2008-Perry #architecture #design #evolution #maintenance #using
Issues in Architecture Evolution: Using Design Intent in Maintenance and Controlling Dynamic Evolution (DEP), p. 1.
ECSAECSA-2008-SanzQCMO #architecture #modelling #representation #using
Representing Service-Oriented Architectural Models Using pi-ADL (MLS, ZQ, CEC, EM, FO), pp. 273–280.
QoSAQoSA-2008-ArdagnaGM #architecture #modelling
Rethinking the Use of Models in Software Architecture (DA, CG, RM), pp. 1–27.
WICSAWICSA-2008-Aldrich #architecture #using
Using Types to Enforce Architectural Structure (JA), pp. 211–220.
WICSAWICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability #using
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
ASEASE-2008-AdnanGDZ #analysis #clustering #component #design #interface #using
Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASEASE-2008-AndreouP #estimation #fuzzy #using
Software Cost Estimation using Fuzzy Decision Trees (ASA, EP), pp. 371–374.
ASEASE-2008-BrichauKM #source code #using
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASEASE-2008-CamachoM #automation #named #using
APPAREIL: A Tool for Building Automated Program Translators Using Annotated Grammars (DOC, KM), pp. 489–490.
ASEASE-2008-Hall #modelling #queue #realtime #specification #using #validation
Validating Real Time Specifications using Real Time Event Queue Modeling (RJH), pp. 79–88.
ASEASE-2008-KhalekELK #constraints #generative #relational #testing #theorem proving #using
Query-Aware Test Generation Using a Relational Constraint Solver (SAK, BE, YOL, SK), pp. 238–247.
ASEASE-2008-PortOM #requirements #simulation #using
Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
ASEASE-2008-RakamaricH #automation #axiom #static analysis #using
Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
CASECASE-2008-AddadA #algebra #architecture #evaluation #graph #modelling #using
Modeling and response time evaluation of ethernet-based control architectures using timed event graphs and Max-Plus algebra (BA, SA), pp. 418–423.
CASECASE-2008-Andoh #identification #using
Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
CASECASE-2008-ChoiJSKRKKSACC #automation #development #flexibility #framework #mobile #using
Development of flexible laboratory automation platform using Mobile Agents in the clinical laboratory (BC, SMJ, SHS, JK, SR, MCK, JK, WHS, KTA, WC, HRC), pp. 918–923.
CASECASE-2008-DaiCL #using
Robot tracking using vision and laser sensors (WD, AC, PXL), pp. 169–174.
CASECASE-2008-DangWLZ #algorithm #image
Heavy-ion radiotherapy treatment planning system and medical image processing algorithm used in it (JD, YW, SL, ZZ), pp. 726–731.
CASECASE-2008-HanX #identification #multi #network #using
Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
CASECASE-2008-HooverMR #3d #detection #image #matrix #using
Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
CASECASE-2008-HouZWCT #adaptation #approach #fuzzy #nondeterminism #using
Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
CASECASE-2008-LiuSXYLZF #agile #approach #using
Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
CASECASE-2008-MitaniH #analysis #metric #symmetry #using
Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASECASE-2008-MittalYBB #difference #equation #modelling #multi #performance #probability #using
Dynamics and performance modeling of multi-stage manufacturing systems using nonlinear stochastic differential equations (UM, HY, STSB, LGB), pp. 498–503.
CASECASE-2008-NagleW #named #using
GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CASECASE-2008-PonnambalamPMS #network #using
Modified ART1 neural networks for cell formation using production data (SGP, RSP, SSM, SS), pp. 603–608.
CASECASE-2008-RohPSYC0LC #flexibility #using
Flexible docking mechanism using combination of magnetic force with error-compensation capability (SgR, JHP, YKS, KY, MC, HSK, HL, HRC), pp. 697–702.
CASECASE-2008-SharmaBDC #assembly #generative #optimisation #sequence #using
Generation of optimized robotic assembly sequence using ant colony optimization (SS, BBB, PD, BBC), pp. 894–899.
CASECASE-2008-SrivastavaVK #combinator #using
Procurement of global logistics services using combinatorial auctions (NKS, NV, SK), pp. 297–302.
CASECASE-2008-TamadazteDFF #automation #multi #using #visual notation
Automatic micromanipulation using multiscale visual servoing (BT, SD, GF, NLFP), pp. 977–982.
CASECASE-2008-UnverM #automation #composition #design pattern #throughput #using
Using architectural software patterns in support of controlling modular high throughput screening automation systems (HÖÜ, JM), pp. 912–917.
CASECASE-2008-XuDAG #3d #random #using
Motion planning for steerable needles in 3D environments with obstacles using rapidly-exploring Random Trees and backchaining (JX, VD, RA, KG), pp. 41–46.
CASECASE-2008-ZhuCS #markov #recognition #using
Human intention recognition in Smart Assisted Living Systems using a Hierarchical Hidden Markov Model (CZ, QC, WS), pp. 253–258.
DACDAC-2008-BharathES #algorithm #automation #search-based #using
Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM (KB, EE, MS), pp. 560–565.
DACDAC-2008-BrockmanLKKM #array #design #memory management #multi #programmable #using
Design of a mask-programmable memory/multiplier array using G4-FET technology (JBB, SL, PMK, AK, MMM), pp. 337–338.
DACDAC-2008-CookS #design #predict #using
Predictive design space exploration using genetically programmed response surfaces (HC, KS), pp. 960–965.
DACDAC-2008-CoskunRG #learning #multi #online #using
Temperature management in multiprocessor SoCs using online learning (AKC, TSR, KCG), pp. 890–893.
DACDAC-2008-DargaSM #performance #symmetry #using
Faster symmetry discovery using sparsity of symmetries (PTD, KAS, ILM), pp. 149–154.
DACDAC-2008-DasikaDFMB #using
DVFS in loop accelerators using BLADES (GSD, SD, KF, SAM, DMB), pp. 894–897.
DACDAC-2008-GaoKKLAM #estimation #hybrid #multi #performance #simulation #using
Multiprocessor performance estimation using hybrid simulation (LG, KK, SK, RL, GA, HM), pp. 325–330.
DACDAC-2008-GulatiK #fault #simulation #towards #using
Towards acceleration of fault simulation using graphics processing units (KG, SPK), pp. 822–827.
DACDAC-2008-JinC #benchmark #case study #metric #performance #simulation #statistics #using
Improve simulation efficiency using statistical benchmark subsetting: an ImplantBench case study (ZJ, ACC), pp. 970–973.
DACDAC-2008-JoshiCSBA #power management #reduction #using
Leakage power reduction using stress-enhanced layouts (VJ, BC, DS, DB, KA), pp. 912–917.
DACDAC-2008-Ng #challenge #modelling #using #verification
Challenges in using system-level models for RTL verification (KN), pp. 812–815.
DACDAC-2008-OzisikyilmazMC #design #machine learning #performance #using
Efficient system design space exploration using machine learning techniques (, GM, ANC), pp. 966–969.
DACDAC-2008-PaulB #configuration management #memory management #performance #resource management #using
Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
DACDAC-2008-SauerGL #framework #functional #modelling #named #performance #using
SystemClick: a domain-specific framework for early exploration using functional performance models (CS, MG, HPL), pp. 480–485.
DACDAC-2008-TamPB #analysis #automation #layout #locality #precise #using
Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DACDAC-2008-YuB #fault #multi #using
Multiple defect diagnosis using no assumptions on failing pattern characteristics (XY, RD(B), pp. 361–366.
DACDAC-2008-ZhangYZDKDKC #optimisation #power management #using
Low power passive equalizer optimization using tritonic step response (LZ, WY, HZ, AD, GAK, DMD, ESK, CKC), pp. 570–573.
DATEDATE-2008-BadarogluDLC #using
Calibration of Integrated CMOS Hall Sensors Using Coil-on-Chip in ATE Environment (MB, GD, FL, OC), pp. 873–878.
DATEDATE-2008-BrisolaraORLCW #code generation #uml #using
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-ChoiC #testing #using
Digital bit stream jitter testing using jitter expansion (HWC, AC), pp. 1468–1473.
DATEDATE-2008-CopeCL #configuration management #gpu #logic #memory management #using
Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
DATEDATE-2008-CorderoK #using
Clock Distribution Scheme using Coplanar Transmission Lines (VHCC, SPK), pp. 985–990.
DATEDATE-2008-FarahaniFS #architecture #network #scalability #using
Scalable Architecture for on-Chip Neural Network Training using Swarm Intelligence (AFF, SMF, SS), pp. 1340–1345.
DATEDATE-2008-FeinsteinTM #detection #equivalence #logic #using
Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
DATEDATE-2008-GhoshNR #adaptation #fault tolerance #novel #using
A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking (SG, PN, KR), pp. 366–371.
DATEDATE-2008-KazmierskiZA #approximate #mobile #modelling #performance #using
Efficient circuit-level modelling of ballistic CNT using piecewise non-linear approximation of mobile charge density (TJK, DZ, BMAH), pp. 146–151.
DATEDATE-2008-LiMM #concurrent #named #self #using
CASP: Concurrent Autonomous Chip Self-Test Using Stored Test Patterns (YL, SM, SM), pp. 885–890.
DATEDATE-2008-Marques-SilvaP #algorithm #satisfiability #using
Algorithms for Maximum Satisfiability using Unsatisfiable Cores (JMS, JP), pp. 408–413.
DATEDATE-2008-MuraliMAGBBM #manycore #optimisation #using
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization (SM, AM, DA, RG, SPB, LB, GDM), pp. 110–115.
DATEDATE-2008-NagpalGK #approach #design #using
A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
DATEDATE-2008-PakbazniaP #using
Coarse-Grain MTCMOS Sleep Transistor Sizing Using Delay Budgeting (EP, MP), pp. 385–390.
DATEDATE-2008-ParkSP #embedded #execution #using
Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
DATEDATE-2008-PlazaMB #constraints #generative #random #using
Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
DATEDATE-2008-PradhanV #performance #synthesis #using
Fast Analog Circuit Synthesis Using Sensitivity Based Near Neighbor Searches (AP, RV), pp. 523–526.
DATEDATE-2008-SchirnerD #modelling #scheduling #using
Introducing Preemptive Scheduling in Abstract RTOS Models using Result Oriented Modeling (GS, RD), pp. 122–127.
DATEDATE-2008-SteinhorstH #model checking #specification #using
Model Checking of Analog Systems using an Analog Specification Language (SS, LH), pp. 324–329.
DATEDATE-2008-TanQ #framework #markov #power management #probability #using
A Framework of Stochastic Power Management Using Hidden Markov Model (YT, QQ), pp. 92–97.
DATEDATE-2008-ThoguluvaRC #architecture #performance #programmable #security #using
Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
DATEDATE-2008-VillarJGK #specification #using
Heterogeneous System-level Specification Using SystemC (EV, AJ, CG, TK).
DATEDATE-2008-YuanHX
Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
DATEDATE-2008-ZhangHXL #fault #manycore #using
Defect Tolerance in Homogeneous Manycore Processors Using Core-Level Redundancy with Unified Topology (LZ, YH, QX, XL), pp. 891–896.
DATEDATE-2008-ZhouPB #analysis #generative #metric #modelling #using
Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
DocEngDocEng-2008-AlkhateebL #composition #documentation #generative #towards #using
Towards extending and using SPARQL for modular document generation (FA, SL), pp. 164–172.
DocEngDocEng-2008-KumarS #automation #documentation #n-gram #using
Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
DocEngDocEng-2008-Nguyen #algorithm #documentation #image #using
A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DocEngDocEng-2008-RonnauPB #documentation #reliability #using #xml
Merging changes in XML documents using reliable context fingerprints (SR, CP, UMB), pp. 52–61.
DocEngDocEng-2008-ValleCP #documentation #identification #performance #using #visual notation
Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
DRRDRR-2008-AntaniDLST #image
Exploring use of images in clinical articles for decision support in evidence-based medicine (SA, DDF, JL, BVS, GRT), p. 68150.
DRRDRR-2008-BaiNS #composition #using
Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRRDRR-2008-ChanVT #identification #online #prototype #using
Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
DRRDRR-2008-El-HajjML #modelling #recognition #using #word
Recognition of Arabic handwritten words using contextual character models (REH, CM, LLS), p. 681503.
DRRDRR-2008-ShafaitKB #adaptation #image #implementation #performance #using
Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
DRRDRR-2008-XiangTLW #recognition #reliability #using
Achieving high recognition reliability using decision trees and AdaBoost (JX, XT, YL, PSPW), p. 68150.
DRRDRR-2008-XiuB #adaptation #recognition #using
Whole-book recognition using mutual-entropy-driven model adaptation (PX, HSB), p. 681506.
DRRDRR-2008-ZouLT #html #online #using
Extracting a sparsely located named entity from online HTML medical articles using support vector machine (JZ, DXL, GRT), p. 68150.
HTHT-2008-ChiM #comprehension #performance #social #using
Understanding the efficiency of social tagging systems using information theory (EHC, TM), pp. 81–88.
HTHT-2008-ChoudhurySJS #communication #predict #social #using
Dynamic prediction of communication flow using social context (MDC, HS, AJ, DDS), pp. 49–54.
HTHT-2008-Diniz #education #hypermedia #using
Efl and hypertext: using webquests to maximize english teaching (MGD), pp. 223–224.
HTHT-2008-LeeBG #community #ranking #similarity #using
Extracting and ranking viral communities using seeds and content similarity (HCL, AB, LG), pp. 139–148.
HTHT-2008-TomsaB #social #using #visualisation
Hyperlinks visualization using social bookmarking (MT, MB), pp. 245–246.
SIGMODSIGMOD-2008-BohmFP #clustering #component #independence #using
Outlier-robust clustering using independent components (CB, CF, CP), pp. 185–198.
SIGMODSIGMOD-2008-LeeC #performance #query #using
Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
SIGMODSIGMOD-2008-ScheideggerVKFS #query #workflow
Querying and re-using workflows with VsTrails (CES, HTV, DK, JF, CTS), pp. 1251–1254.
VLDBVLDB-2008-BiveinisS #in memory #performance #towards
Towards efficient main-memory use for optimum tree index update (LB, SS), pp. 1617–1622.
VLDBVLDB-2008-Cohen #constraints #generative #using #xml
Generating XML structure using examples and constraints (SC), pp. 490–501.
VLDBVLDB-2008-CohenK #estimation #sketching #using
Tighter estimation using bottom k sketches (EC, HK), pp. 213–224.
VLDBVLDB-2008-CormodeSYZ #graph #using
Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDBVLDB-2008-FontouraJKOTV #taxonomy #using
Relaxation in text search using taxonomies (MF, VJ, RK, CO, AT, SV), pp. 672–683.
VLDBVLDB-2008-KwonBG #distributed #fault tolerance #file system #using
Fault-tolerant stream processing using a distributed, replicated file system (YK, MB, AGG), pp. 574–585.
VLDBVLDB-2008-LeeHLG #classification #clustering #named #using
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering (JGL, JH, XL, HG), pp. 1081–1094.
VLDBVLDB-2008-MetwallyEAA #correlation #detection #named #using
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
CSEETCSEET-2008-GotterbarnM #re-engineering #using
Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
CSEETCSEET-2008-JohnsgardM #bibliography #programming #using
Using Alice in Overview Courses to Improve Success Rates in Programming I (KJ, JM), pp. 129–136.
CSEETCSEET-2008-RasR #information management #learning #using
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning (ER, JR), pp. 77–84.
CSEETCSEET-2008-SalamahG #education #model checking #specification #using
A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
ITiCSEITiCSE-2008-Albin-ClarkK #game studies #simulation
The use of role play to simulate a tethered swarm of robots for urban search and rescue (USAR) (AAC, TRVAK), p. 335.
ITiCSEITiCSE-2008-Connolly #design #development #education #multi #using
Complecto mutatio: teaching software design best practices using multi-platform development (RWC), p. 345.
ITiCSEITiCSE-2008-DennyLH #student
Student use of the PeerWise system (PD, ALR, JH), pp. 73–77.
ITiCSEITiCSE-2008-Deugo08a #eclipse #using
Using eclipse in the classroom (DD), p. 322.
ITiCSEITiCSE-2008-Kurmas #automation #logic #performance #student #testing #using
Improving student performance using automated testing of simulated digital logic circuits (ZK), pp. 265–270.
ITiCSEITiCSE-2008-LinhoffS #education #game studies #programming #using
Teaching game programming using XNA (JL, AS), pp. 250–254.
ITiCSEITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards #using
Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
ITiCSEITiCSE-2008-SalterD #logic #multi #scalability #using
Using DLSim 3: a scalable, extensible, multi-level logic simulator (RMS, JLD), p. 315.
FASEFASE-2008-AlrajehRU #behaviour #modelling #using
Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
FASEFASE-2008-BergJR #similarity #state machine #testing #using
Regular Inference for State Machines Using Domains with Equality Tests (TB, BJ, HR), pp. 317–331.
FASEFASE-2008-JurjensSY #analysis #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FoSSaCSFoSSaCS-2008-GruberJ #bound #communication #complexity #regular expression #using
Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
TACASTACAS-2008-ChocklerGY #automation #performance #refinement #using
Efficient Automatic STE Refinement Using Responsibility (HC, OG, AY), pp. 233–248.
TACASTACAS-2008-McMillan #generative #invariant #proving #quantifier #using
Quantified Invariant Generation Using an Interpolating Saturation Prover (KLM), pp. 413–427.
TACASTACAS-2008-SankaranarayananDI #hybrid #model checking #using
Symbolic Model Checking of Hybrid Systems Using Template Polyhedra (SS, TD, FI), pp. 188–202.
CSMRCSMR-2008-CosmaM #comprehension #dependence #distributed #object-oriented #using
Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies (DCC, RM), pp. 103–112.
CSMRCSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability #using
Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
CSMRCSMR-2008-LagerstromJ #architecture #enterprise #maintenance #modelling #predict #using
Using Architectural Models to Predict the Maintainability of Enterprise Systems (RL, PJ), pp. 248–252.
CSMRCSMR-2008-MendeBKM #clone detection #detection #evolution #product line #using
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
CSMRCSMR-2008-SmitSW #case study #documentation #user interface
Use Case Redocumentation from GUI Event Traces (MS, ES, KW), pp. 263–268.
CSMRCSMR-2008-SpekKL #architecture #concept #semantics #towards #using
Towards Recovering Architectural Concepts Using Latent Semantic Indexing (PvdS, SK, PvdL), pp. 253–257.
CSMRCSMR-2008-Trifu #data flow #identification #object-oriented #using
Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code #using
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-HaiducM #on the #source code
On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPCICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing #using
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSMEICSM-2008-KinneerR #algorithm #control flow #java #maintenance #representation #type inference
Assessing the usefulness of type inference algorithms in representing Java control flow to support software maintenance tasks (AK, GR), pp. 127–136.
ICSMEICSM-2008-KothariBMS #algebra #development #on the #performance #using
On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
ICSMEICSM-2008-LiH #random testing #testing #using
Using random test selection to gain confidence in modified software (WL, MJH), pp. 267–276.
ICSMEICSM-2008-LuciaOV #metric #semantics #using
Using structural and semantic metrics to improve class cohesion (ADL, RO, LV), pp. 27–36.
ICSMEICSM-2008-MalikH #adaptation #co-evolution #evolution #heuristic #using
Supporting software evolution using adaptive change propagation heuristics (HM, AEH), pp. 177–186.
ICSMEICSM-2008-RiccaPT #guidelines #lessons learnt #maintenance
Guidelines on the use of Fit tables in software maintenance tasks: Lessons learned from 8 experiments (FR, MDP, MT), pp. 317–326.
MSRMSR-2008-HataMK #precise #using
An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
MSRMSR-2008-SiyCS #challenge #developer #segmentation #using
Summarizing developer work history using time series segmentation: challenge report (HPS, PC, MS), pp. 137–140.
SCAMSCAM-2008-BoogerdM #analysis #data flow #on the #profiling
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAMSCAM-2008-CeccatoDT #legacy #program transformation #using
Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
SCAMSCAM-2008-GiffhornH #analysis #java #precise #source code #using
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAMSCAM-2008-JiaH #fault #higher-order #mutation testing #testing #using
Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
WCREWCRE-2008-GrantCS #analysis #automation #component #concept #independence #using
Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCREWCRE-2008-LukinsKE #debugging #locality #retrieval #source code #using
Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCREWCRE-2008-Muliawan #higher-order #model transformation #using
Extending a Model Transformation Language Using Higher Order Transformations (OM), pp. 315–318.
WCREWCRE-2008-RompaeyD #estimation #using
Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
PEPMPEPM-2008-GillenwaterMSZTGO #hardware #static typing #using
Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
PEPMPEPM-2008-ZhuK #library #using
Specialization for applications using shared libraries (PZ, SCK), pp. 159–168.
PLDIPLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code #using
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
SASSAS-2008-AllamigeonGG #invariant #using
Inferring Min and Max Invariants Using Max-Plus Polyhedra (XA, SG, EG), pp. 189–204.
SASSAS-2008-LalR #data flow #multi #query #using
Solving Multiple Dataflow Queries Using WPDSs (AL, TWR), pp. 93–109.
SASSAS-2008-PrabhuS #analysis #array #java #pointer #using
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
SASSAS-2008-RamanathanSGJ #protocol #using
Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
STOCSTOC-2008-Ben-AroyaT #combinator #graph #using
A combinatorial construction of almost-ramanujan graphs using the zig-zag product (ABA, ATS), pp. 325–334.
STOCSTOC-2008-DeKSS #composition #integer #multi #performance #using
Fast integer multiplication using modular arithmetic (AD, PPK, CS, RS), pp. 499–506.
FLOPSFLOPS-2008-Julien #induction #integer #using
Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base (NJ), pp. 48–63.
FLOPSFLOPS-2008-PrinceGM #proving #using
Proving Properties about Lists Using Containers (RP, NG, CM), pp. 97–112.
CIAACIAA-2008-GarciaPAR #automaton #finite #learning #nondeterminism #regular expression #using
Learning Regular Languages Using Nondeterministic Finite Automata (PG, MVdP, GIA, JR), pp. 92–101.
DLTDLT-2008-Jancar #decidability #similarity
Selected Ideas Used for Decidability and Undecidability of Bisimilarity (PJ), pp. 56–71.
ICALPICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability #using
Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
LATALATA-2008-Klunder #automaton #finite #using
Characterization of Star-Connected Languages Using Finite Automata (BK), pp. 311–320.
FMFM-2008-ChalinR #fault #ml #performance #runtime #using
JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity (PC, FR), pp. 246–261.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-MacedoLF #development #distributed #incremental #realtime #using
Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM (HDM, PGL, JSF), pp. 181–197.
SEFMSEFM-2008-GuoS #finite #impact analysis #proving #state machine #theorem proving #using
Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover (BG, MS), pp. 335–344.
SEFMSEFM-2008-SalasK #modelling #policy #privacy #testing #using
Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFMSEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol #using
Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
SEFMSEFM-2008-XavierHM #fault tolerance #source code #using #verification
Using Formal Verification to Reduce Test Space of Fault-Tolerant Programs (KSX, SH, ACVdM), pp. 181–190.
IFLIFL-2008-LijnseP #automation #data type #database #programming #relational #using
Between Types and Tables — Using Generic Programming for Automated Mapping between Data Types and Relational Databases (BL, RP), pp. 272–290.
GT-VMTGT-VMT-2006-JakobS08 #graph grammar #metamodelling #modelling #using
View Creation of Meta Models by Using Modified Triple Graph Grammars (JJ, AS), pp. 181–190.
GT-VMTGT-VMT-2006-Varro08 #database #graph transformation #implementation #independence #plugin #query #using
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries (GV), pp. 121–132.
GT-VCGT-VC-2007-BruniBGM08 #architecture #graph grammar #modelling #using
Modelling Dynamic Software Architectures using Typed Graph Grammars (RB, AB, SG, HCM), pp. 39–53.
GT-VMTGT-VMT-2008-BaresiGMM #abstraction #graph transformation #using #verification
Using Graph Transformation Systems to Specify and Verify Data Abstractions (LB, CG, AM, MM).
GT-VMTGT-VMT-2008-BucchiaroneG #architecture #using #verification
Dynamic Software Architectures Verification using DynAlloy (AB, JPG).
GT-VMTGT-VMT-2008-GrabskaSL #design #graph transformation #reasoning #visual notation
Visual Design and Reasoning with the Use of Hypergraph Transformations (EG, GMS, TLL).
ICGTICGT-2008-EhrigE #correctness #graph #model transformation #semantics #using
Semantical Correctness and Completeness of Model Transformations Using Graph and Rule Transformation (HE, CE), pp. 194–210.
ICGTICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network #using
Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
ICGTICGT-2008-RangelLKEB #behaviour #refactoring #using
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
ICGTICGT-2008-Striewe #graph grammar #implementation #state machine #using
Using a Triple Graph Grammar for State Machine Implementations (MS), pp. 514–516.
CHICHI-2008-BuechleyECC #arduino #education #using
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science education (LB, ME, JC, AC), pp. 423–432.
CHICHI-2008-ClawsonLRIS #automation #fault #type system #using
Automatic whiteout++: correcting mini-QWERTY typing errors using keypress timing (JC, KL, AR, RAI, TS), pp. 573–582.
CHICHI-2008-DugganP #topic #using #web
Knowledge in the head and on the web: using topic expertise to aid search (GBD, SJP), pp. 39–48.
CHICHI-2008-GeyerDDMBM #reuse #social
Use and reuse of shared lists as a social content type (WG, CD, JMD, DRM, BB, MJM), pp. 1545–1554.
CHICHI-2008-GrafSSWR #interactive #search-based #user interface #using
In-car interaction using search-based user interfaces (SG, WS, AS, AW, GR), pp. 1685–1688.
CHICHI-2008-GuoS #case study #comparative #interactive #user interface
Exploring the use of tangible user interfaces for human-robot interaction: a comparative study (CG, ES), pp. 121–130.
CHICHI-2008-HornbaekF #empirical #evaluation #usability
Making use of business goals in usability evaluation: an experiment with novice evaluators (KH, EF), pp. 903–912.
CHICHI-2008-HsiehLHK #communication #using
Using tags to assist near-synchronous communication (GH, JL, SEH, RK), pp. 223–226.
CHICHI-2008-Joinson #facebook #people
Looking at, looking up or keeping up with people?: motives and use of facebook (ANJ), pp. 1027–1036.
CHICHI-2008-KangWA #interactive #mobile #social #using #video
Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
CHICHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #using #web
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHICHI-2008-KobayashiI #multi #scalability #using
Ninja cursors: using multiple cursors to assist target acquisition on large screens (MK, TI), pp. 949–958.
CHICHI-2008-LanirBF #design #visual notation
Observing presenters’ use of visual aids to inform the design of classroom presentation software (JL, KSB, LF), pp. 695–704.
CHICHI-2008-LawranceBBR #behaviour #maintenance #using
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
CHICHI-2008-MorrisBM #named #type system #using
SuperBreak: using interactivity to enhance ergonomic typing breaks (DM, AJBB, BM), pp. 1817–1826.
CHICHI-2008-MoscovichH #multi #using
Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
CHICHI-2008-MunteanuBP #collaboration #editing #usability
Collaborative editing for improved usefulness and usability of transcript-enhanced webcasts (CM, RB, GP), pp. 373–382.
CHICHI-2008-OganAJ #learning #predict
Pause, predict, and ponder: use of narrative videos to improve cultural discussion and learning (AO, VA, CJ), pp. 155–162.
CHICHI-2008-RatwaniMT #eye tracking #fault #predict #using
Predicting postcompletion errors using eye movements (RMR, JMM, JGT), pp. 539–542.
CHICHI-2008-RohsO #lens
Target acquisition with camera phones when used as magic lenses (MR, AO), pp. 1409–1418.
CHICHI-2008-SankarpandianLE #named #using
Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
CHICHI-2008-SaponasTMB #interface #using
Demonstrating the feasibility of using forearm electromyography for muscle-computer interfaces (TSS, DST, DM, RB), pp. 515–524.
CHICHI-2008-SzentgyorgyiTL #game studies #social
Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system (CS, MAT, EL), pp. 1463–1472.
CHICHI-2008-TianXWZLSD #3d #user interface #using
Tilt menu: using the 3D orientation information of pen devices to extend the selection capability of pen-based user interfaces (FT, LX, HW, XZ, YL, VS, GD), pp. 1371–1380.
CHICHI-2008-WangM #interactive #learning
Human-Currency Interaction: learning from virtual currency use in China (YW, SDM), pp. 25–28.
CHICHI-2008-WycheAG
Re-placing faith: reconsidering the secular-religious use divide in the United States and Kenya (SW, PMA, REG), pp. 11–20.
CHICHI-2008-YataniPBN #gesture #named #using
Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
CSCWCSCW-2008-ChungH #distributed #network
Network structure, position, ties and ICT use in distributed knowledge-intensive work (KSKC, LH), pp. 545–554.
CSCWCSCW-2008-HancockTF #symmetry
I know something you don’t: the use of asymmetric personal information for interpersonal advantage (JTH, CLT, KF), pp. 413–416.
CSCWCSCW-2008-LampeES #facebook
Changes in use and perception of facebook (CL, NBE, CS), pp. 721–730.
CSCWCSCW-2008-LiuLC
Operationalization of technology use and cooperation in CSCW (PJL, JML, KRC), pp. 505–514.
CSCWCSCW-2008-ReillyMWI #using
Small details: using one device to navigate together (DFR, BM, CRW, KMI), pp. 253–256.
SOFTVISSOFTVIS-2008-AnslowNMB #3d #using #visualisation #web
Web software visualization using extensible 3D (X3D) graphics (CA, JN, SM, RB), pp. 213–214.
SOFTVISSOFTVIS-2008-Eichelberger #automation #case study #diagrams #layout #uml
Automatic layout of UML use case diagrams (HE), pp. 105–114.
SOFTVISSOFTVIS-2008-ParduhnSW #algorithm #graph #using #visualisation
Algorithm visualization using concrete and abstract shape graphs (SAP, RS, RW), pp. 33–36.
SOFTVISSOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #using #visualisation
Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
AdaEuropeAdaEurope-2008-Evequoz #concurrent #performance #using #word
Practical, Fast and Simple Concurrent FIFO Queues Using Single Word Synchronization Primitives (CE), pp. 59–72.
AdaSIGAda-2008-Moore #ada #using
A buffer container class hierarchy using Ada 2005 (BJM), pp. 57–74.
AdaSIGAda-2008-SwardW #architecture #enterprise #multi #using
A multi-language service-oriented architecture using an enterprise service bus (RES, KJW), pp. 85–90.
CAiSECAiSE-2008-DeckerKLPW #modelling #using
Modeling Service Choreographies Using BPMN and BPEL4Chor (GD, OK, FL, KP, MW), pp. 79–93.
CAiSECAiSE-2008-HerssensJF #using
Capturing and Using QoS Relationships to Improve Service Selection (CH, IJ, SF), pp. 312–327.
CAiSECAiSE-2008-MuehlenR #how #modelling #process
How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
CAiSECAiSE-2008-ViscusiTS #approach #case study #empirical #using
Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
EDOCEDOC-2008-KavimandanKG #automation #enterprise #model transformation #synthesis #using #workflow
Automated Context-Sensitive Dialog Synthesis for Enterprise Workflows Using Templatized Model Transformations (AK, RK, ASG), pp. 159–168.
EDOCEDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality #using
Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOCEDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol #using
Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEISICEIS-AIDSS-2008-BurdescuML #concept #student #using
Building a Decision Support System for Students by Using Concept Maps (DDB, MCM, BL), pp. 130–135.
ICEISICEIS-AIDSS-2008-MahdaviSP #approach #automation #using
Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
ICEISICEIS-AIDSS-2008-Nachev #network #using
Forecasting with ARTMAP-IC Neural Networks — An Application Using Corporate Bankruptcy Data (AN), pp. 167–172.
ICEISICEIS-AIDSS-2008-SchmidtV #reasoning #using
Using Case-Based Reasoning to Explain Exceptional Cases (RS, OV), pp. 119–124.
ICEISICEIS-AIDSS-2008-TsengKH #approach #assembly #using
A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
ICEISICEIS-DISI-2008-MoraGRPBGCR #metric #qvt #using
Software Measurement by Using QVT Transformations in an MDA Context (BM, FG, FR, MP, AB, AG, JÁC, IR), pp. 117–124.
ICEISICEIS-HCI-2008-LeivaCGA #development #maintenance #using #workflow
A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEISICEIS-HCI-2008-MordechaiFD #interface #named #taxonomy #using
TTLS: A Grouped Display of Search Results Based on Organizational Taxonomy Using the LCC&K Interface (VM, AJF, OD), pp. 47–53.
ICEISICEIS-ISAS1-2008-GullaBK #concept #ontology #using
Using Association Rules to Learn Concept Relationships in Ontologies (JAG, TB, GSK), pp. 58–65.
ICEISICEIS-ISAS1-2008-LoewensternS #lifecycle #using
IT Service Management of Using Heterogeneous, Dynamically Alterable Configuration Item Lifecycles (DL, LS), pp. 155–160.
ICEISICEIS-ISAS2-2008-BrunetSLG #modelling #using
Using Variants in KAOS Goal Modelling (JB, FS, RL, CG), pp. 339–344.
ICEISICEIS-ISAS2-2008-PivetaMPAGP #process #ranking #refactoring #using
Ranking Refactoring Patterns Using the Analytical Hierarchy Process (EKP, AMDM, MSP, JA, PG, RTP), pp. 195–200.
ICEISICEIS-ISAS2-2008-Prpitsch #process #using
From Process to Software Systems’ Service — Using a Layered Model to Connect Technical and Process-related Views (CP), pp. 298–304.
ICEISICEIS-J-2008-PapatheocharousA08a #algorithm #approach #hybrid #modelling #network #predict #search-based #using
Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
ICEISICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics
Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEISICEIS-SAIC-2008-BoukadiGV #aspect-oriented #collaboration #enterprise #using
Enhancing Enterprise Collaboration Using Context-Aware Service Based on Aspects (KB, CG, LV), pp. 29–36.
ICEISICEIS-SAIC-2008-BrockeTW #e-commerce #mobile
Making Use of Mobile Devices in E-Commerce — Overcoming Organizational Barriers through User Participation (JvB, BT, DW), pp. 168–173.
ICEISICEIS-SAIC-2008-DAgostiniFDG #semantics #using
Contextual Semantic Search — Capturing, using the User’s Context to Direct Semantic Search (CSD, RF, MARD, FAOG), pp. 154–159.
ICEISICEIS-SAIC-2008-KangasharjuK #data transfer #mobile #using #xml
Using Bit-Efficient XML to Optimize Data Transfer of XForms-Based Mobile Services (JK, OK), pp. 5–11.
ICEISICEIS-SAIC-2008-RanW #adaptation #metric #performance #using
Develop Adaptive Workplace E-Learning Environments by Using Performance Measurement Systems (WR, MW), pp. 142–147.
ICEISICEIS-SAIC-2008-StellerKCNL #approach #pervasive #reasoning #semantics #using
A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
CIKMCIKM-2008-BaoYFXSY #social #using
Boosting social annotations using propagation (SB, BY, BF, SX, ZS, YY), pp. 1507–1508.
CIKMCIKM-2008-BarskySTU #using
A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKMCIKM-2008-BischoffFNP #question
Can all tags be used for search? (KB, CSF, WN, RP), pp. 193–202.
CIKMCIKM-2008-BroderCFGJR #feedback #using #web
Search advertising using web relevance feedback (AZB, PC, MF, EG, VJ, LR), pp. 1013–1022.
CIKMCIKM-2008-ChanLY #logic #modelling #using
Coreference resolution using expressive logic models (KC, WL, XY), pp. 1373–1374.
CIKMCIKM-2008-DaoudTB #graph #ontology #personalisation #using
Using a graph-based ontological user profile for personalizing search (MD, LTL, MB), pp. 1495–1496.
CIKMCIKM-2008-HuangS #markov #query #using
A latent variable model for query expansion using the hidden markov model (QH, DS), pp. 1417–1418.
CIKMCIKM-2008-MahouiTSC #identification #modelling #predict #using
Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
CIKMCIKM-2008-MaYLK #mining #network #process #social #using
Mining social networks using heat diffusion processes for marketing candidates selection (HM, HY, MRL, IK), pp. 233–242.
CIKMCIKM-2008-MaYLK08a #matrix #named #probability #recommendation #social #using
SoRec: social recommendation using probabilistic matrix factorization (HM, HY, MRL, IK), pp. 931–940.
CIKMCIKM-2008-MeiZC #query #using
Query suggestion using hitting time (QM, DZ, KWC), pp. 469–478.
CIKMCIKM-2008-QuMG #network #semantics #using
Using tag semantic network for keyphrase extraction in blogs (LQ, CM, IG), pp. 1381–1382.
CIKMCIKM-2008-RahurkarC #using
Using the current browsing context to improve search relevance (MR, SC), pp. 1493–1494.
CIKMCIKM-2008-RaviP #scalability #using
Using structured text for large-scale attribute extraction (SR, MP), pp. 1183–1192.
CIKMCIKM-2008-RosenfeldFU #classification #sequence #using #web
Using sequence classification for filtering web pages (BR, RF, LHU), pp. 1355–1356.
CIKMCIKM-2008-SeoC #using
Blog site search using resource selection (JS, WBC), pp. 1053–1062.
CIKMCIKM-2008-ShiNC #using
Relating dependent indexes using dempster-shafer theory (LS, JYN, GC), pp. 429–438.
CIKMCIKM-2008-VinayMC #effectiveness #rank #retrieval #using
Estimating retrieval effectiveness using rank distributions (VV, NMF, IJC), pp. 1425–1426.
CIKMCIKM-2008-WangZRM #automation #online #ranking #topic #using
Automatic online news topic ranking using media focus and user attention based on aging theory (CW, MZ, LR, SM), pp. 1033–1042.
CIKMCIKM-2008-XinLTL #comprehension #random #using
Academic conference homepage understanding using constrained hierarchical conditional random fields (XX, JL, JT, QL), pp. 1301–1310.
CIKMCIKM-2008-XuDW #query #using #wiki
Entity-based query reformulation using wikipedia (YX, FD, BW), pp. 1441–1442.
ECIRECIR-2008-AbdullahG #approach #usability #using
Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
ECIRECIR-2008-AyacheQ #corpus #learning #using #video
Video Corpus Annotation Using Active Learning (SA, GQ), pp. 187–198.
ECIRECIR-2008-CloughR #design #image #using #visualisation
Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ECIRECIR-2008-EidoonYO #ontology #using
Ontology Matching Using Vector Space (ZE, NY, FO), pp. 472–481.
ECIRECIR-2008-HeLR #metric #predict #query #using
Using Coherence-Based Measures to Predict Query Difficulty (JH, ML, MdR), pp. 689–694.
ECIRECIR-2008-HuangBCQ #image #network #retrieval #using #web
Improving Web Image Retrieval Using Image Annotations and Inference Network (PH, JB, CC, GQ), pp. 617–621.
ECIRECIR-2008-LillisTCD #data fusion #probability #using
Extending Probabilistic Data Fusion Using Sliding Windows (DL, FT, RWC, JD), pp. 358–369.
ECIRECIR-2008-NaKL08c #probability #similarity #using
Query-Based Inter-document Similarity Using Probabilistic Co-relevance Model (SHN, ISK, JHL), pp. 684–688.
ECIRECIR-2008-NunesRD #web
Use of Temporal Expressions in Web Search (SN, CR, GD), pp. 580–584.
ECIRECIR-2008-RitchieTR #information retrieval #using
Using Terms from Citations for IR: Some First Results (AR, ST, SR), pp. 211–221.
ECIRECIR-2008-ScholerSBT #using
Using Clicks as Implicit Judgments: Expectations Versus Observations (FS, MS, BB, AT), pp. 28–39.
ECIRECIR-2008-SongHRB #composition #mining #modelling #multi #query #using
Facilitating Query Decomposition in Query Language Modeling by Association Rule Mining Using Multiple Sliding Windows (DS, QH, SMR, PB), pp. 334–345.
ECIRECIR-2008-ValletHJ #evaluation #graph #recommendation
Use of Implicit Graph for Recommending Relevant Videos: A Simulated Evaluation (DV, FH, JMJ), pp. 199–210.
ECIRECIR-2008-ZhaoST #effectiveness #performance #predict #query #similarity #using #variability
Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence (YZ, FS, YT), pp. 52–64.
ICMLICML-2008-DoshiPR #learning #using
Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
ICMLICML-2008-KirshnerP #dependence #using
ICA and ISA using Schweizer-Wolff measure of dependence (SK, BP), pp. 464–471.
ICMLICML-2008-LarochelleB #classification #strict #using
Classification using discriminative restricted Boltzmann machines (HL, YB), pp. 536–543.
ICMLICML-2008-SahbiARK #kernel #recognition #robust #using
Robust matching and recognition using context-dependent kernels (HS, JYA, JR, RK), pp. 856–863.
ICMLICML-2008-SalakhutdinovM08a #markov #matrix #monte carlo #probability #using
Bayesian probabilistic matrix factorization using Markov chain Monte Carlo (RS, AM), pp. 880–887.
ICMLICML-2008-ShiBY #learning #modelling #using
Data spectroscopy: learning mixture models using eigenspaces of convolution operators (TS, MB, BY), pp. 936–943.
ICMLICML-2008-SyedBS #learning #linear #programming #using
Apprenticeship learning using linear programming (US, MHB, RES), pp. 1032–1039.
ICMLICML-2008-Tieleman #approximate #strict #using
Training restricted Boltzmann machines using approximations to the likelihood gradient (TT), pp. 1064–1071.
ICMLICML-2008-WangM #analysis #using
Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICMLICML-2008-YueJ #predict #set #using
Predicting diverse subsets using structural SVMs (YY, TJ), pp. 1224–1231.
ICPRICPR-2008-Abd-AlmageedASD #classification #hybrid #using
Document-zone classification using partial least squares and hybrid classifiers (WAA, MA, WS, DSD), pp. 1–4.
ICPRICPR-2008-AgrisBK #adaptation #agile #approach #recognition #using
Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
ICPRICPR-2008-AmanoK #feedback #using
Appearance enhancement using a projector-camera feedback system (TA, HK), pp. 1–4.
ICPRICPR-2008-Baradarani #segmentation #using
Moving object segmentation using the 9/7-10/8 dual-tree complex filter bank (AB), pp. 1–4.
ICPRICPR-2008-BarratT #effectiveness #image #network #retrieval #semantics #using #visual notation
Visual features with semantic combination using Bayesian network for a more effective image retrieval (SB, ST), pp. 1–4.
ICPRICPR-2008-BazinKDV #image #using
Improvement of feature matching in catadioptric images using gyroscope data (JCB, IK, CD, PV), pp. 1–5.
ICPRICPR-2008-CamposJ #constraints #learning #network #parametricity #using
Improving Bayesian Network parameter learning using constraints (CPdC, QJ), pp. 1–4.
ICPRICPR-2008-ChakrabortyE #constraints #invariant #locality #using
Object localization using affine invariant substructure constraints (IC, AME), pp. 1–5.
ICPRICPR-2008-ChamaretM #using #validation #video
Attention-based video reframing: Validation using eye-tracking (CC, OLM), pp. 1–4.
ICPRICPR-2008-ChandraS #using
A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPRICPR-2008-ChangLAH #clique #clustering #constraints #using
Unsupervised clustering using hyperclique pattern constraints (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChangLAH08a #collaboration #image #learning #using
Using collaborative learning for image contrast enhancement (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChenCW #higher-order #named #performance #using
HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods (AYCC, JJC, LW), pp. 1–4.
ICPRICPR-2008-ChenSXS #algorithm #identification #search-based #using
Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
ICPRICPR-2008-ChenZP #segmentation #using
Unsupervised dynamic texture segmentation using local spatiotemporal descriptors (JC, GZ, MP), pp. 1–4.
ICPRICPR-2008-CheongL #approach #image #matrix #multi #orthogonal #recognition #using
An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
ICPRICPR-2008-ChoB #dependence #image #using
Image inpainting using wavelet-based inter- and intra-scale dependency (DC, TDB), pp. 1–4.
ICPRICPR-2008-ChoiMSH #analysis #using
Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPRICPR-2008-ChuangHFH #detection #multi #using
Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
ICPRICPR-2008-DehzangiMCL #classification #fuzzy #learning #speech #using
Fuzzy rule selection using Iterative Rule Learning for speech data classification (OD, BM, CES, HL), pp. 1–4.
ICPRICPR-2008-DonoserB #matrix #segmentation #using
Using covariance matrices for unsupervised texture segmentation (MD, HB), pp. 1–4.
ICPRICPR-2008-EmmsHW #graph #quantum #using
Graph drawing using quantum commute time (DE, ERH, RCW), pp. 1–4.
ICPRICPR-2008-FabletLSMCB #learning #using
Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPRICPR-2008-FengGDJ #retrieval #using
Motion capture data retrieval using an artist’s doll (TCF, PG, JD, BJ), pp. 1–4.
ICPRICPR-2008-FerrerVSRB #algorithm #approximate #graph #using
An approximate algorithm for median graph computation using graph embedding (MF, EV, FS, KR, HB), pp. 1–4.
ICPRICPR-2008-GatosPP #adaptation #documentation #image #multi #using
Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
ICPRICPR-2008-GhoshM #classification #documentation #kernel #similarity #using #xml
Combining content and structure similarity for XML document classification using composite SVM kernels (SG, PM), pp. 1–4.
ICPRICPR-2008-GongC #graph #learning #online #optimisation #realtime #segmentation #using
Real-time foreground segmentation on GPUs using local online learning and global graph cut optimization (MG, LC), pp. 1–4.
ICPRICPR-2008-Gonzalez-AguirreABD #geometry #graph #modelling #self #using #visual notation
Model-based visual self-localization using geometry and graphs (DIGA, TA, EBC, RD), pp. 1–5.
ICPRICPR-2008-GuehamBC #automation #classification #correlation #forensics #using
Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
ICPRICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #using #video
An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
ICPRICPR-2008-GuoYZZY #embedded #markov #random #using
Face super-resolution using 8-connected Markov Random Fields with embedded prior (KG, XY, RZ, GZ, SY), pp. 1–4.
ICPRICPR-2008-HahnKW #3d #algorithm #estimation #using
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm (MH, LK, CW), pp. 1–4.
ICPRICPR-2008-HainesW #random #using
Combining shape-from-shading and stereo using Gaussian-Markov random fields (TSFH, RCW), pp. 1–4.
ICPRICPR-2008-HanYJ #evaluation #online #using
Online feature evaluation for object tracking using Kalman Filter (ZH, QY, JJ), pp. 1–4.
ICPRICPR-2008-HidakaK #feature model #optimisation #using
Non-Neighboring Rectangular Feature selection using Particle Swarm Optimization (AH, TK), pp. 1–4.
ICPRICPR-2008-HortaMF #algorithm #clustering #comparison #image #using
A comparison of clustering fully polarimetric SAR images using SEM algorithm and G0P mixture modelwith different initializations (MMH, NDAM, ACF), pp. 1–4.
ICPRICPR-2008-HossainMJY #adaptation #identification #invariant #using
Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
ICPRICPR-2008-HsiaoCC #recognition #using
Human action recognition using temporal-state shape contexts (PCH, CSC, LWC), pp. 1–4.
ICPRICPR-2008-HuangST #detection #using #video
Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
ICPRICPR-2008-HuAS08a #learning #using
Learning motion patterns in crowded scenes using motion flow field (MH, SA, MS), pp. 1–5.
ICPRICPR-2008-HuSM #categorisation #clustering #using
Categorization using semi-supervised clustering (JH, MS, AM), pp. 1–4.
ICPRICPR-2008-IbrahimG #online #using #verification
On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPRICPR-2008-Ilic #recognition #using
Object labeling for recognition using vocabulary trees (SI), pp. 1–4.
ICPRICPR-2008-IzadiS #robust #using
Robust region-based background subtraction and shadow removing using color and gradient information (MI, PS), pp. 1–5.
ICPRICPR-2008-JiaDQA #3d #estimation #metric #using
Directionality measurement and illumination estimation of 3D surface textures by using mojette transform (PJ, JD, LQ, FA), pp. 1–4.
ICPRICPR-2008-KaholV #analysis #modelling #process #using
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPRICPR-2008-KangKNN #image #multi #recognition #segmentation #using
Multiband image segmentation and object recognition using texture filter banks (YK, KK, TN, YN), pp. 1–4.
ICPRICPR-2008-KarnickMP #approach #classification #concept #incremental #learning #multi #using
Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
ICPRICPR-2008-KashimaHRS #clustering #distance #using
K-means clustering of proportional data using L1 distance (HK, JH, BKR, MS), pp. 1–4.
ICPRICPR-2008-KasuyaKKO #estimation #robust #using
Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
ICPRICPR-2008-KatayamaUS #coordination #online #recognition #using
A new HMM for on-line character recognition using pen-direction and pen-coordinate features (YK, SU, HS), pp. 1–4.
ICPRICPR-2008-KazuiMMF #detection #matrix #using
Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
ICPRICPR-2008-KimS #consistency #detection #sequence #using #video
Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
ICPRICPR-2008-Kita #case study #detection #image #using
A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
ICPRICPR-2008-KleinLM #using
Preceding car tracking using belief functions and a particle filter (JK, CL, PM), pp. 1–4.
ICPRICPR-2008-KonKAT #adaptation #detection #interactive #realtime #using
Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
ICPRICPR-2008-LachezeB #image #locality #using
Image sampling for localization using entropy (LL, RB), pp. 1–4.
ICPRICPR-2008-LeeWN #detection #performance #using
Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
ICPRICPR-2008-LiDM #feature model #learning #locality #using
Localized feature selection for Gaussian mixtures using variational learning (YL, MD, YM), pp. 1–4.
ICPRICPR-2008-LinG #infinity #using
Depth recovery using defocus blur at infinity (HYL, KDG), pp. 1–4.
ICPRICPR-2008-LiuS08a #detection #robust #using
Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
ICPRICPR-2008-LiYWS #invariant #using
Bi-model tracking of object of interest using invariant spatiogram descriptor (JL, WYY, JGW, WS), pp. 1–4.
ICPRICPR-2008-LiZ #algorithm #fixpoint #matrix #named #performance
FastNMF: A fast monotonic fixed-point non-negative Matrix Factorization algorithm with high ease of use (LL, YJZ), pp. 1–4.
ICPRICPR-2008-Machucho-CadenaCB #using
Rendering of brain tumors using endoneurosonography (RMC, SdlCR, EBC), pp. 1–4.
ICPRICPR-2008-MakiHM #image #using
Tracking features on a moving object using local image bases (AM, YH, TM), pp. 1–5.
ICPRICPR-2008-MandalW #recognition #using
Face recognition using curvelet based PCA (TM, QMJW), pp. 1–4.
ICPRICPR-2008-MaruyamaKYT #3d #locality #using
3D object localization based on occluding contour using STL CAD model (KM, YK, TY, FT), pp. 1–4.
ICPRICPR-2008-MeiS #image #parametricity #statistics #using
Unsupervised image embedding using nonparametric statistics (GM, CRS), pp. 1–4.
ICPRICPR-2008-MirzaeiR #clustering #transitive #using
Combining hierarchical clusterings using min-transitive closure (AM, MR), pp. 1–4.
ICPRICPR-2008-MohantaSC #detection #multi #using
Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
ICPRICPR-2008-MooreSLD #image #segmentation #top-down #using
Top down image segmentation using congealing and graph-cut (DM, JS, SL, BAD), pp. 1–4.
ICPRICPR-2008-MunizCR #classification #independence
Use of band ratioing for building illumination independent texture classification systems (RM, JAC, MRS), pp. 1–4.
ICPRICPR-2008-MuraiF #bound #detection #using #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
ICPRICPR-2008-OnishiTA #3d #estimation #image #using
3D human posture estimation using the HOG features from monocular image (KO, TT, YA), pp. 1–4.
ICPRICPR-2008-PaclikLND #analysis #estimation #multi #using
Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPRICPR-2008-PalaioB #adaptation #multi #using
Multi-object tracking using an adaptive transition model particle filter with region covariance data association (HP, JB), pp. 1–4.
ICPRICPR-2008-PanBS #detection #image #representation #using
Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
ICPRICPR-2008-PengXXD #recognition #using
Face recognition using anisotropic dual-tree complex wavelet packets (YP, XX, WX, QD), pp. 1–4.
ICPRICPR-2008-PohK #authentication #bound #fault #multimodal #on the #using
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPRICPR-2008-RebiereAD #image #using
Image mosaicing using local optical flow registration (NR, MFAF, FD), pp. 1–5.
ICPRICPR-2008-Rokui #using
Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
ICPRICPR-2008-RyooA #fuzzy #nondeterminism #process #using
Human activities: Handling uncertainties using fuzzy time intervals (MSR, JKA), pp. 1–5.
ICPRICPR-2008-SahaB #clustering #multi #symmetry #using
A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
ICPRICPR-2008-SanromaSA #clique #graph
Improving the matching of graphs generated from shapes by the use of procrustes distances into a clique-based MAP formulation (GS, FS, RA), pp. 1–4.
ICPRICPR-2008-SekiH #3d #multi #realtime #using
Real-time 3D tracking using multiple sample points (AS, HH), pp. 1–4.
ICPRICPR-2008-ShenCH #image #retrieval #using
Face image retrieval by using Haar features (BCS, CSC, HHH), pp. 1–4.
ICPRICPR-2008-ShenCLB #random #using
Stereo matching using random walks (RS, IC, XL, AB), pp. 1–4.
ICPRICPR-2008-ShenZL #detection #higher-order #programming #using
Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
ICPRICPR-2008-ShinK #algorithm #using
Enhanced Resolution-aware Fitting algorithm using interpolation operator (JS, DK), pp. 1–4.
ICPRICPR-2008-ShivakumaraHT #detection #performance #using #video
Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
ICPRICPR-2008-SinghNGBSP #hybrid #random #using
Hybrid SVM — Random Forest classication system for oral cancer screening using LIF spectra (RKS, SKN, LG, SB, CS, KMP), pp. 1–4.
ICPRICPR-2008-Stelldinger #re-engineering #using
Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting (PS), pp. 1–4.
ICPRICPR-2008-SugaFTA #graph #recognition #segmentation #using
Object recognition and segmentation using SIFT and Graph Cuts (AS, KF, TT, YA), pp. 1–4.
ICPRICPR-2008-SugimotoO #array #image #synthesis #using
Virtual focusing image synthesis for user-specified image region using camera array (SS, MO), pp. 1–4.
ICPRICPR-2008-SukumarBPKA #locality #multi #nondeterminism #using
Uncertainty minimization in multi-sensor localization systems using model selection theory (SRS, HB, DLP, AK, MAA), pp. 1–4.
ICPRICPR-2008-SuS #generative #modelling #using
Generative models for fingerprint individuality using ridge models (CS, SNS), pp. 1–4.
ICPRICPR-2008-SuzukiSZ #network
Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD) (KS, ZS, JZ), pp. 1–4.
ICPRICPR-2008-TabboneTB #retrieval
Histogram of radon transform. A useful descriptor for shape retrieval (ST, ORT, SB), pp. 1–4.
ICPRICPR-2008-TaketomiSY #database #estimation #realtime #using
Real-time camera position and posture estimation using a feature landmark database with priorities (TT, TS, NY), pp. 1–4.
ICPRICPR-2008-ThomeeHBL #retrieval #using
Using an artificial imagination for texture retrieval (BT, MJH, EMB, MSL), pp. 1–4.
ICPRICPR-2008-Trujillo-RomeroD #pseudo #using
Registration by using a pseudo color attribute (FTR, MD), pp. 1–4.
ICPRICPR-2008-TsolakisFD #framework #performance #using
A framework for efficient correspondence using feature interrelations (AGT, MF, AD), pp. 1–4.
ICPRICPR-2008-TsuchiyaF #feature model #using
A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPRICPR-2008-UedaT #locality #on the #scalability #using
On the scalability of robot localization using high-dimensional features (TU, KT), pp. 1–4.
ICPRICPR-2008-UkitaKK #using
IBR-based free-viewpoint imaging of a complex scene using few cameras (NU, SK, MK), pp. 1–4.
ICPRICPR-2008-VajariaSK #multi #retrieval #using
Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
ICPRICPR-2008-Vega-PonsRV #algorithm #segmentation #set #using
Active contour algorithm for texture segmentation using a texture feature set (SVP, JLGR, OLV), pp. 1–4.
ICPRICPR-2008-WachenfeldTJ #recognition #robust #using
Robust recognition of 1-D barcodes using camera phones (SW, ST, XJ), pp. 1–4.
ICPRICPR-2008-WangC #classification #semantics #using
Film shot classification using directing semantics (HLW, LFC), pp. 1–4.
ICPRICPR-2008-WangM #invariant #probability #recognition #similarity #using
Scale invariant face recognition using probabilistic similarity measure (ZW, ZM), pp. 1–4.
ICPRICPR-2008-WangTHW #bound #using
Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPRICPR-2008-WatanabeIHY #algorithm #performance #reduction #using #video
A fast algorithm of video super-resolution using dimensionality reduction by DCT and example selection (KW, YI, TH, MY), pp. 1–5.
ICPRICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social #using
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
ICPRICPR-2008-WongCF #adaptation #image #using
Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
ICPRICPR-2008-WuF #3d #classification #learning #multi #using
Multiple view based 3D object classification using ensemble learning of local subspaces (JW, KF), pp. 1–4.
ICPRICPR-2008-XiaoL #higher-order #using
Improvement on Mean Shift based tracking using second-order information (LX, PL), pp. 1–4.
ICPRICPR-2008-XiaoWH #graph #invariant #recognition #using
Object recognition using graph spectral invariants (XB, RCW, ERH), pp. 1–4.
ICPRICPR-2008-YamaguchiWNN #estimation #image #sequence #using
Road region estimation using a sequence of monocular images (KY, AW, TN, YN), pp. 1–4.
ICPRICPR-2008-YangB #algorithm #fault #sketching #using
Curve fitting algorithm using iterative error minimization for sketch beautification (JY, HB), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-YangYWY #fuzzy #recognition #using
Face recognition using Complete Fuzzy LDA (WY, HY, JW, JY), pp. 1–4.
ICPRICPR-2008-YanZ #correlation #multimodal #using
Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
ICPRICPR-2008-YaoADTHM #using
Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT (JY, NA, AD, AMTD, OMH, JM), pp. 1–4.
ICPRICPR-2008-YaoCAPKA #probability #using
Sensor planning for PTZ cameras using the probability of camera overload (YY, CHC, BRA, DLP, AK, MAA), pp. 1–5.
ICPRICPR-2008-YenCWWC #using #video
A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
ICPRICPR-2008-YiAC #invariant #kernel #using
Orientation and scale invariant mean shift using object mask-based kernel (KMY, HSA, JYC), pp. 1–4.
ICPRICPR-2008-YingZ #detection #performance #using
Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
ICPRICPR-2008-ZareG #detection #process #using
Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
ICPRICPR-2008-ZhangYDG #recognition #using
Handwritten Chinese character recognition using Local Discriminant Projection with Prior Information (HZ, JY, WD, JG), pp. 1–4.
ICPRICPR-2008-ZhaoG #multi #recognition #using
Establishing point correspondence using multidirectional binary pattern for face recognition (SZ, YG), pp. 1–4.
ICPRICPR-2008-ZhongYSCG #clustering #using
Hierarchical background subtraction using local pixel clustering (BZ, HY, SS, XC, WG), pp. 1–4.
ICPRICPR-2008-ZhouWS #classification #process #recognition #using
Human motion recognition using Gaussian Processes classification (HZ, LW, DS), pp. 1–4.
ICPRICPR-2008-ZhuangZHH #estimation #markov #using
Face age estimation using patch-based hidden Markov model supervectors (XZ, XZ, MHJ, TSH), pp. 1–4.
ICPRICPR-2008-ZitouniSOD #algorithm #graph #image #ranking #using #web
Re-ranking of web image search results using a graph algorithm (HZ, SGS, DO, PD), pp. 1–4.
KDDKDD-2008-CaroCS #using
Using tagflake for condensing navigable tag hierarchies from tag clouds (LDC, KSC, MLS), pp. 1069–1072.
KDDKDD-2008-ChowGS #detection #privacy #using
Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDDKDD-2008-Christen #automation #classification #nearest neighbour #using
Automatic record linkage using seeded nearest neighbour and support vector machine classification (PC), pp. 151–159.
KDDKDD-2008-GallagherTEF #classification #network #using
Using ghost edges for classification in sparsely labeled networks (BG, HT, TER, CF), pp. 256–264.
KDDKDD-2008-GrossmanG #data mining #mining #performance #using
Data mining using high performance data clouds: experimental studies using sector and sphere (RLG, YG), pp. 920–927.
KDDKDD-2008-HallSM #dependence #using
Unsupervised deduplication using cross-field dependencies (RH, CAS, AM), pp. 310–317.
KDDKDD-2008-HoT #automation #multi #using
Automated cyclone discovery and tracking using knowledge sharing in multiple heterogeneous satellite data (SSH, AT), pp. 928–936.
KDDKDD-2008-KoenigsteinST #analysis #query #string #using
Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDDKDD-2008-LaxmanTW #generative #modelling #predict #sequence #using
Stream prediction using a generative model based on frequent episodes in event sequences (SL, VT, RWW), pp. 453–461.
KDDKDD-2008-MelvilleRL #modelling #using #web
Customer targeting models using actively-selected web content (PM, SR, RDL), pp. 946–953.
KDDKDD-2008-SarmaGI #query #using
Bypass rates: reducing query abandonment using negative inferences (ADS, SG, SI), pp. 177–185.
KDDKDD-2008-SatoYN #graph #information management #parametricity #semantics #using #word
Knowledge discovery of semantic relationships between words using nonparametric bayesian graph model (IS, MY, HN), pp. 587–595.
KDDKDD-2008-ShengPI #data mining #mining #multi #quality #using
Get another label? improving data quality and data mining using multiple, noisy labelers (VSS, FJP, PGI), pp. 614–622.
KDDKDD-2008-WangD #classification #kernel #semantics #using #wiki
Building semantic kernels for text classification using wikipedia (PW, CD), pp. 713–721.
KDDKDD-2008-YuJ #kernel #using
Training structural svms with kernels using sampled cuts (CNJY, TJ), pp. 794–802.
KDDKDD-2008-ZengMLBM #analysis #predict #using
Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KRKR-2008-DohertyS #reasoning #using
Reasoning with Qualitative Preferences and Cardinalities using Generalized Circumscription (PD, AS), pp. 560–570.
KRKR-2008-MotikGHS #graph #representation #using
Representing Structured Objects using Description Graphs (BM, BCG, IH, US), pp. 296–306.
RecSysRecSys-2008-BogersB #recommendation #using
Recommending scientific articles using citeulike (TB, AvdB), pp. 287–290.
RecSysRecSys-2008-KagieWG #difference #using
Choosing attribute weights for item dissimilarity using clikstream data with an application to a product catalog map (MK, MCvW, PJFG), pp. 195–202.
RecSysRecSys-2008-Kwon #rating #recommendation #using
Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
RecSysRecSys-2008-ShepitsenGMB #clustering #personalisation #recommendation #social #using
Personalized recommendation in social tagging systems using hierarchical clustering (AS, JG, BM, RDB), pp. 259–266.
RecSysRecSys-2008-ZanardiC #ranking #recommendation #social #using
Social ranking: uncovering relevant content using tag-based recommender systems (VZ, LC), pp. 51–58.
SEKESEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability #using
Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
SEKESEKE-2008-BalushiSPCL #identification #ontology #quality #using
Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SEKESEKE-2008-Barros #information management #predict #using
Predicting Software Project Size Using Project Generated Information (MdOB), pp. 149–154.
SEKESEKE-2008-BrandlFW #modelling #reasoning #testing #using
Coverage-based Testing Using Qualitative Reasoning Models (HB, GF, FW), pp. 393–398.
SEKESEKE-2008-DasguptaEFKSV #design #fault tolerance #grid #standard #using
Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy (GD, OE, LF, SK, SMS, BV), pp. 814–819.
SEKESEKE-2008-DuZR #concept analysis #release planning #using
Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
SEKESEKE-2008-FilhoV #testing #using #web #web service #xml
Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
SEKESEKE-2008-FraserWW #automaton #testing #using
Using Observer Automata to Select Test Cases for Test Purposes (GF, MW, FW), pp. 709–714.
SEKESEKE-2008-HittleG #fault #file system #injection #testing #using
Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SEKESEKE-2008-KimBBSA #behaviour #named #using #visualisation
VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
SEKESEKE-2008-KornerG #automation #ontology #using
Improving Automatic Model Creation Using Ontologies (SJK, TG), pp. 691–696.
SEKESEKE-2008-LucasSM #classification #personalisation #recommendation #towards
Comparing the Use of Traditional and Associative Classifiers towards Personalized Recommendations (JPL, SS, MNMG), pp. 607–612.
SEKESEKE-2008-MahoneyE #monitoring #using
Using Scenario Monitoring to Address State Based Crosscutting Concerns (MM, TE), pp. 581–586.
SEKESEKE-2008-MarquesMNF #approach #interface #ontology #semantics #using #web #web service
Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
SEKESEKE-2008-MuhlenfeldMMS #execution #modelling #ontology #process #using
Ontology-based Process Modeling and Execution Using STEP/EXPRESS (AM, WM, FM, MS), pp. 935–940.
SEKESEKE-2008-MurphyKHW #machine learning #testing
Properties of Machine Learning Applications for Use in Metamorphic Testing (CM, GEK, LH, LW), pp. 867–872.
SEKESEKE-2008-ParkK #automaton #bound #constraints #lts #model checking #using
Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKESEKE-2008-ReddyreddyX #using #xml
Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
SEKESEKE-2008-TekbacakTD #approach #certification #data access #security #semantics #using
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
SEKESEKE-2008-ZhongYAF #using
Ontology-learning Supported Sematic Search Using Cooperative Agents (CZ, Z(Y, MA, BHF), pp. 123–128.
SEKESEKE-2008-ZhouRF #case study #component #development #estimation #reuse
Supporting Reusable Component Selection with Use Case Gap-based Development Effort Estimation (XZ, BR, CF), pp. 155–166.
SIGIRSIGIR-2008-BalogRW #modelling #retrieval #using
Bloggers as experts: feed distillation using expert retrieval models (KB, MdR, WW), pp. 753–754.
SIGIRSIGIR-2008-Banerjee #classification #corpus #modelling #topic #using
Improving text classification accuracy using topic modeling over an additional corpus (SB), pp. 867–868.
SIGIRSIGIR-2008-BenderskyK #graph #ranking #using
Re-ranking search results using document-passage graphs (MB, OK), pp. 853–854.
SIGIRSIGIR-2008-BuscherDE #feedback #query #using
Query expansion using gaze-based feedback on the subdocument level (GB, AD, LvE), pp. 387–394.
SIGIRSIGIR-2008-DingLLP #clustering #probability #using
Posterior probabilistic clustering using NMF (CHQD, TL, DL, WP), pp. 831–832.
SIGIRSIGIR-2008-DruckMM #learning #using
Learning from labeled features using generalized expectation criteria (GD, GSM, AM), pp. 595–602.
SIGIRSIGIR-2008-Gan #approach #query #using
Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
SIGIRSIGIR-2008-GengLQALS #nearest neighbour #query #ranking #using
Query dependent ranking using K-nearest neighbor (XG, TYL, TQ, AA, HL, HYS), pp. 115–122.
SIGIRSIGIR-2008-GuanWCBW #crawling #effectiveness #estimation #online #topic #using
Guide focused crawler efficiently and effectively using on-line topical importance estimation (ZG, CW, CC, JB, JW), pp. 757–758.
SIGIRSIGIR-2008-HeMO #metric #retrieval #using
Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
SIGIRSIGIR-2008-HeMO08a #ranking #using
Ranking opinionated blog posts using OpinionFinder (BH, CM, IO), pp. 727–728.
SIGIRSIGIR-2008-JiangN #using #video #visual notation
Bag-of-visual-words expansion using visual relatedness for video indexing (YGJ, CWN), pp. 769–770.
SIGIRSIGIR-2008-JohoHJ #documentation #summary #using
Emulating query-biased summaries using document titles (HJ, DH, JMJ), pp. 709–710.
SIGIRSIGIR-2008-KapteinLHK #modelling #using #web
Using parsimonious language models on web data (RK, RL, DH, JK), pp. 763–764.
SIGIRSIGIR-2008-PengL #analysis #evolution #topic #using
Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIRSIGIR-2008-TanWC #detection #sentiment #using
Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
SIGIRSIGIR-2008-TrieschniggMRK #concept #modelling #using
Measuring concept relatedness using language models (DT, EM, MdR, WK), pp. 823–824.
SIGIRSIGIR-2008-VelosoAGM #learning #rank #using
Learning to rank at query-time using association rules (AV, HMdA, MAG, WMJ), pp. 267–274.
SIGIRSIGIR-2008-WangH #documentation #retrieval #using
Improving biomedical document retrieval using domain knowledge (SW, MH), pp. 785–786.
SIGIRSIGIR-2008-WanY #analysis #clustering #multi #summary #using
Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIRSIGIR-2008-WhiteRBH #multi #web
Enhancing web search by promoting multiple search engine use (RWW, MR, MB, APH), pp. 43–50.
SIGIRSIGIR-2008-YuZXG #categorisation #design #learning #using
trNon-greedy active learning for text categorization using convex ansductive experimental design (KY, SZ, WX, YG), pp. 635–642.
BXBX-2008-Hidaka1 #bidirectional #graph transformation #using
Bidirectional Graph Transformation using UnCAL (SH), p. 43.
ECMFAECMDA-FA-2008-BercoviciFW #architecture #using
From Business Architecture to SOA Realization Using MDD (AB, FF, AJW), pp. 381–392.
ECMFAECMDA-FA-2008-NogueraD #domain model #framework #modelling #using #validation
Annotation Framework Validation Using Domain Models (CN, LD), pp. 48–62.
ECMFAECMDA-FA-2008-RechS #bibliography #fault #modelling #visual notation
A Survey about the Intent to Use Visual Defect Annotations for Software Models (JR, AS), pp. 406–418.
ICMTICMT-2008-VignagaPB #contract #interactive #model transformation #using
Extracting Object Interactions Out of Software Contracts Using Model Transformations (AV, DP, MCB), pp. 245–259.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection #using
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-GutierrezNCMR #automation #case study #diagrams #process #visualisation
Visualization of Use Cases through Automatically Generated Activity Diagrams (JJG, CN, MJEC, MM, IMR), pp. 83–96.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing #using
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #using #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection #using
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-GutierrezNCMR #automation #case study #diagrams #process #visualisation
Visualization of Use Cases through Automatically Generated Activity Diagrams (JJG, CN, MJEC, MM, IMR), pp. 83–96.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing #using
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml #using
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #using #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
ECOOPECOOP-2008-TemperoNM #empirical #how #inheritance #java #source code
How Do Java Programs Use Inheritance? An Empirical Study of Inheritance in Java Software (EDT, JN, HM), pp. 667–691.
TOOLSTOOLS-EUROPE-2008-CohenGM #program transformation #using
Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
GPCEGPCE-2008-ApelKB #aspect-oriented #functional #refactoring #using
Program refactoring using functional aspects (SA, CK, DSB), pp. 161–170.
GPCEGPCE-2008-Batory #modelling #using
Using modern mathematics as an FOSD modeling language (DSB), pp. 35–44.
GPCEGPCE-2008-GottschlingL #c++ #compilation #concept #library #performance #reuse #robust #semantics #using
Integrating semantics and compilation: using c++ concepts to develop robust and efficient reusable libraries (PG, AL), pp. 67–76.
PPDPPPDP-2008-MoralesCH #automaton #generative #using
Comparing tag scheme variations using an abstract machine generator (JFM, MC, MVH), pp. 32–43.
PPDPPPDP-2008-PlasmeijerJKA #ajax #declarative #evaluation #using #workflow
Declarative Ajax and client side evaluation of workflows using iTasks (RP, JMJ, PWMK, PA), pp. 56–66.
QAPLQAPL-2008-Smith #abstract interpretation #imperative #probability #source code #using
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions (MJAS), pp. 43–59.
PADLPADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming #using
Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
POPLPOPL-2008-LahiriQ #precise #smt #using #verification
Back to the future: revisiting precise program verification using SMT solvers (SKL, SQ), pp. 171–182.
RERE-2008-Castro-HerreraDCM #data mining #elicitation #mining #process #recommendation #requirements #scalability #using
Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes (CCH, CD, JCH, BM), pp. 165–168.
RERE-2008-FeatherHMU #analysis #deployment #requirements #using
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RERE-2008-FortunaWB #case study #domain model #modelling
Info Cases: Integrating Use Cases and Domain Models (MHF, CMLW, MRSB), pp. 81–84.
RERE-2008-JonesLML #learning #requirements
Use and Influence of Creative Ideas and Requirements for a Work-Integrated Learning System (SJ, PL, NAMM, SNL), pp. 289–294.
RERE-2008-MavinNWML #requirements #using
Using Scenarios to Discover Requirements for Engine Control Systems (AM, MN, PW, NAMM, PL), pp. 235–240.
RERE-2008-RifautD #assessment #framework #quality #requirements #using
Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
RERE-2008-Szoke #automation #scheduling #using
A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQREFSQ-2008-SchlosserJM #database #requirements #using
Using a Creativity Workshop to Generate Requirements for an Event Database Application (CS, SJ, NAMM), pp. 109–122.
SACSAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving #using
Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SACSAC-2008-AbreuGZG #automation #fault #invariant #locality #using
Automatic software fault localization using generic program invariants (RA, AG, PZ, AJCvG), pp. 712–717.
SACSAC-2008-AgulhariSB #using
Compressing electrocardiogram signals using parameterized wavelets (CMA, RMRS, ISB), pp. 1348–1352.
SACSAC-2008-AhamedRH #architecture #distributed #identification #scalability #using
Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SACSAC-2008-AiresSM #using
Optical flow using color information: preliminary results (KRTA, AMS, AADM), pp. 1607–1611.
SACSAC-2008-AndresAN #experience #formal method #information management #using
Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SACSAC-2008-AntonellisMT #clustering #documentation #named #summary #using #xml
XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries (PA, CM, NT), pp. 1081–1088.
SACSAC-2008-AntonyBHP #approach #biology #interactive #mining #using #validation
Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
SACSAC-2008-AraujoPFLO #distributed #named #using
FlagelLink: a decision support system for distributed flagellar data using data warehouse (FFA, ÂMAP, KMF, BFL, DMO), pp. 1268–1272.
SACSAC-2008-BadishiK #adaptation #using
Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
SACSAC-2008-BraghettoFP #algebra #execution #process #using
Using process algebra to control the execution of business processes (KRB, JEF, CP), pp. 128–129.
SACSAC-2008-BroiniziFG #framework #requirements #using
Using annotations in the naked objects framework to explore data requirements (MEBB, JEF, AG), pp. 630–637.
SACSAC-2008-BuenoWJ #automation #generative #testing #using
Automatic test data generation using particle systems (PMSB, WEW, MJ), pp. 809–814.
SACSAC-2008-BussBSE #analysis #flexibility #graph #pointer #using
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SACSAC-2008-CarvalhoLGS #identification #programming #search-based #using
Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
SACSAC-2008-ChalinST #case study #modelling #requirements #transaction
Capturing business transaction requirements in use case models (PC, DS, KT), pp. 602–606.
SACSAC-2008-ChongKLG #energy #network #using
Using association rules for energy conservation in wireless sensor networks (SKC, SK, SWL, MMG), pp. 971–975.
SACSAC-2008-CorreaIZF #analysis #image #mobile #using
Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SACSAC-2008-Denner-Broser #algorithm #analysis #problem #using
An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SACSAC-2008-DiasSCCA #approach #case study #specification
Elaboration of use case specifications: an approach based on use case fragments (FGD, EAS, MLMC, ALC, AJA), pp. 614–618.
SACSAC-2008-DingMH #approach #refinement #specification #using
An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
SACSAC-2008-FonsecaVM #data access #detection #online #using
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-GarciaH #analysis #functional #metric #using
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-GarciaT #security #semantics #using #web #web service
Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SACSAC-2008-HieronsJUY #adaptation #sequence #using
Using adaptive distinguishing sequences in checking sequence constructions (RMH, GVJ, HU, HY), pp. 682–687.
SACSAC-2008-KeyvanpourA #approach #image #interactive #retrieval #semantics #using
A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
SACSAC-2008-KuangZ #algorithm #detection #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LiG #detection #network #optimisation #using
TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
SACSAC-2008-LuizPBR #approach #mobile #programming #search-based #using
A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
SACSAC-2008-MaagG #approach #protocol #self #testing #using
Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SACSAC-2008-MatosBP #recognition #using
Face recognition using DCT coefficients selection (FMdSM, LVB, JvdP), pp. 1753–1757.
SACSAC-2008-MengleG #algorithm #ambiguity #classification #feature model #using
Using ambiguity measure feature selection algorithm for support vector machine classifier (SSRM, NG), pp. 916–920.
SACSAC-2008-MengleGP #category theory #classification #using
Discovering relationships among categories using misclassification information (SSRM, NG, AP), pp. 932–937.
SACSAC-2008-MorimotoO #metric #using #video
Eyelid measurements using digital video processing (CHM, TFdO), pp. 1369–1373.
SACSAC-2008-Nassiri #3d #e-commerce #trust
Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SACSAC-2008-NecaskyP #concept #design #semantics #using #web #web service
Designing semantic web services using conceptual model (MN, JP), pp. 2243–2247.
SACSAC-2008-OsadaOKKK #diagrams #metric #using
Proposing metrics of difficulty of domain knowledge using usecase diagrams (AO, DO, NK, HK, KK), pp. 624–629.
SACSAC-2008-PavelecJBO #identification #independence #using
Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SACSAC-2008-PereiraAGS #architecture #configuration management #hybrid #using
Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture (MMP, SRFdA, BCdO, ISS), pp. 1552–1553.
SACSAC-2008-RadtkeSW #algorithm #classification #using
Using the RRT algorithm to optimize classification systems for handwritten digits and letters (PVWR, RS, TW), pp. 1748–1752.
SACSAC-2008-ReynosoCGP #diagrams #metric #ocl #statechart #uml #using
Formal definition of measures for UML statechart diagrams using OCL (LR, JACL, MG, MP), pp. 846–847.
SACSAC-2008-RochaR #animation #evaluation #using
An evaluation of a collision handling system using sphere-trees for plausible rigid body animation (RdSR, MAFR), pp. 1241–1245.
SACSAC-2008-SchobelP #case study #clustering #cpu #kernel #research #scheduling #using
Kernel-mode scheduling server for CPU partitioning: a case study using the Windows research kernel (MS, AP), pp. 1700–1704.
SACSAC-2008-SomeC #approach #case study #generative
An approach for supporting system-level test scenarios generation from textual use cases (SSS, XC), pp. 724–729.
SACSAC-2008-SuKZG #classification #collaboration #machine learning #using
Imputation-boosted collaborative filtering using machine learning classifiers (XS, TMK, XZ, RG), pp. 949–950.
SACSAC-2008-SungCM #clustering #concept #learning #lifecycle #ontology #performance #using #web
Efficient concept clustering for ontology learning using an event life cycle on the web (SS, SC, DM), pp. 2310–2314.
SACSAC-2008-TanWWC #detection #problem #semantics #using
Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
SACSAC-2008-TierneyJ #ontology #semantics #using
C-SAW---contextual semantic alignment of ontologies: using negative semantic reinforcement (BT, MJ), pp. 2346–2347.
SACSAC-2008-VictorPB #using
Context addressing using context-aware flooding (KV, JP, YB), pp. 1960–1961.
SACSAC-2008-Willassen #calculus #using
Using simplified event calculus in digital investigation (SYW), pp. 1438–1442.
SACSAC-2008-XuWQ #modelling #using #verification
Modeling and verifying BPEL using synchronized net (CX, HW, WQ), pp. 2358–2362.
SACSAC-2008-YuiMUK #distributed #named #parallel #using #xquery
XBird/D: distributed and parallel XQuery processing using remote proxy (MY, JM, SU, HK), pp. 1003–1007.
SACSAC-2008-ZhangMD #feature model #fuzzy #image #retrieval #set #using
Texture feature extraction and description using fuzzy set of main dominant directions of variable scales in content-based medical image retrieval (GZ, ZMM, LD), pp. 1760–1761.
SACSAC-2008-ZhuDXW #documentation #image #linear #using
Perspective rectification of camera-based document images using local linear structure (YZ, RD, BX, CW), pp. 451–452.
FSEFSE-2008-DragertDR #concurrent #generative #using
Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSEFSE-2008-KoesnandarERHSS #metaprogramming #using #web
Using assertions to help end-user programmers create dependable web macros (AK, SGE, GR, LH, CS, KTS), pp. 124–134.
FSEFSE-2008-KulturTB #estimation #memory management #named #network #using
ENNA: software effort estimation using ensemble of neural networks with associative memory (YK, BT, ABB), pp. 330–338.
FSEFSE-2008-OsterweilCEPWBH #dataset #experience #process #using #workflow
Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
FSEFSE-2008-YuWGB #composition #encoding #performance #summary #using #verification #web #web service
Modular verification of web services using efficient symbolic encoding and summarization (FY, CW, AG, TB), pp. 192–202.
ICSEICSE-2008-BunyakiatiFSC #standard #testing #uml #using
Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSEICSE-2008-GannodBH #education #re-engineering #using
Using the inverted classroom to teach software engineering (GCG, JEB, MTH), pp. 777–786.
ICSEICSE-2008-RiccaPTTCV #evolution
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks (FR, MDP, MT, PT, MC, CAV), pp. 361–370.
ICSEICSE-2008-SankaranarayananIG #induction #library #logic programming #mining #specification #using
Mining library specifications using inductive logic programming (SS, FI, AG), pp. 131–140.
ICSEICSE-2008-SicardBP #architecture #component #self #using
Using components for architecture-based management: the self-repair case (SS, FB, NDP), pp. 101–110.
ICSEICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language #using
An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
ICSEICSE-2008-XuR #detection #java #memory management #precise #profiling #using
Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
ICSEICSE-2008-YilmazPW #fault #locality #using
Time will tell: fault localization using time spectra (CY, AMP, CW), pp. 81–90.
ICSEICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict #using
Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
LDTALDTA-2007-AkessonEH08 #compilation #development #jastadd #using
Development of a Modelica Compiler Using JastAdd (, TE, GH), pp. 117–131.
LDTALDTA-2007-HameyG08 #domain-specific language #experience #implementation #stratego #using
Implementing a Domain-Specific Language Using Stratego/XT: An Experience Paper (LGCH, SG), pp. 37–51.
SLESLE-2008-LiangD #evaluation #model transformation #txl #using
A Practical Evaluation of Using TXL for Model Transformation (HL, JD), pp. 245–264.
SLESLE-2008-Nilsson-NymanEH #semiparsing #using
Practical Scope Recovery Using Bridge Parsing (ENN, TE, GH), pp. 95–113.
SPLCSPLC-2008-GustavssonA #embedded #flexibility #product line #using
Evaluating Flexibility in Embedded Automotive Product Lines Using Real Options (HG, JA), pp. 235–242.
SPLCSPLC-2008-HartmannT #diagrams #feature model #multi #product line #using #variability
Using Feature Diagrams with Context Variability to Model Multiple Product Lines for Software Supply Chains (HH, TT), pp. 12–21.
ASPLOSASPLOS-2008-GummarajuCTR #manycore #named #programming #using
Streamware: programming general-purpose multicore processors using streams (JG, JC, YT, MR), pp. 297–307.
CCCC-2008-ZhaoRARW #debugging #how #performance #using
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
HPCAHPCA-2008-ChenMP #constraints #graph #memory management #runtime #using #validation
Runtime validation of memory ordering using constraint graph checking (KC, SM, PP), pp. 415–426.
HPCAHPCA-2008-ChungDKK #memory management #thread #transaction #using
Thread-safe dynamic binary translation using transactional memory (JC, MD, HK, CK), pp. 279–289.
HPCAHPCA-2008-KimGWB #analysis #performance #using
System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
HPCAHPCA-2008-LeeKMP #predict #using
Performance-aware speculation control using wrong path usefulness prediction (CJL, HK, OM, YNP), pp. 39–49.
HPDCHPDC-2008-CarreraSWTA #using
Managing SLAs of heterogeneous workloads using dynamic application placement (DC, MS, IW, JT, EA), pp. 217–218.
HPDCHPDC-2008-KhannaCKSSKF #data transfer #multi #network #optimisation #using
Multi-hop path splitting and multi-pathing optimizations for data transfers over shared wide-area networks using gridFTP (GK, ÜVÇ, TMK, PS, JHS, RK, ITF), pp. 225–226.
HPDCHPDC-2008-ManosMKCKT #distributed #performance #using
Distributed mpi cross-site run performance using mpig (SM, MDM, OK, PVC, NTK, BRT), pp. 229–230.
HPDCHPDC-2008-NathUS #data-driven
Evaluating the usefulness of content addressable storage for high-performance data intensive applications (PN, BU, AS), pp. 35–44.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety #using
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
HPDCHPDC-2008-SotomayorKF #execution #using #virtual machine
Combining batch execution and leasing using virtual machines (BS, KK, ITF), pp. 87–96.
LCTESLCTES-2008-EbnerBSKWK #using
Generalized instruction selection using SSA-graphs (DE, FB, BS, AK, PW, AK), pp. 31–40.
OSDIOSDI-2008-BansalA #using
Binary Translation Using Peephole Superoptimizers (SB, AA), pp. 177–192.
OSDIOSDI-2008-YuIFBEGC #distributed #named #using
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language (YY, MI, DF, MB, ÚE, PKG, JC), pp. 1–14.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
PPoPPPPoPP-2008-AnsariKJLKW #adaptation #algorithm #case study #concurrent #experience #memory management #transaction #using
Experiences using adaptive concurrency in transactional memory with Lee’s routing algorithm (MA, CK, KJ, ML, CCK, IW), pp. 261–262.
PPoPPPPoPP-2008-ChengCHT #classification #manycore #scalability #using
Scalable packet classification using interpreting: a cross-platform multi-core solution (HC, ZC, BH, XT), pp. 33–42.
PPoPPPPoPP-2008-LevM #hardware #memory management #transaction #using
Split hardware transactions: true nesting of transactions using best-effort hardware transactional memory (YL, JWM), pp. 197–206.
PPoPPPPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling #using
Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPPPPoPP-2008-RyooRBSKH #evaluation #gpu #optimisation #parallel #performance #thread #using
Optimization principles and application performance evaluation of a multithreaded GPU using CUDA (SR, CIR, SSB, SSS, DBK, WmWH), pp. 73–82.
CAVCAV-2008-KashyapG #using
Producing Short Counterexamples Using “Crucial Events” (SK, VKG), pp. 491–503.
CAVCAV-2008-KingS #congruence #equation #satisfiability #using
Inferring Congruence Equations Using SAT (AK, HS), pp. 281–293.
CSLCSL-2008-Nguyen #proving #using
Proving Infinitude of Prime Numbers Using Binomial Coefficients (PN), pp. 184–198.
ICLPICLP-2008-AlpuenteEI #dependence #termination #using
Termination of Narrowing Using Dependency Pairs (MA, SE, JI), pp. 317–331.
ICLPICLP-2008-AnhRD #implementation #using
An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLPICLP-2008-Baral #information management #programming #reasoning #representation #set #using
Using Answer Set Programming for Knowledge Representation and Reasoning: Future Directions (CB), pp. 69–70.
ICLPICLP-2008-BeniniBM #constraints #multi #policy #programming #resource management #using
Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLPICLP-2008-CliffeVBP #animation #declarative #named #programming #set #using #visualisation
ASPVIZ: Declarative Visualisation and Animation Using Answer Set Programming (OC, MDV, MB, JAP), pp. 724–728.
ICLPICLP-2008-EglyGW #framework #implementation #named #programming #using
ASPARTIX: Implementing Argumentation Frameworks Using Answer-Set Programming (UE, SAG, SW), pp. 734–738.
ICLPICLP-2008-MontaliTACGLM #declarative #logic programming #specification #using #verification
Verification from Declarative Specifications Using Logic Programming (MM, PT, MA, FC, MG, EL, PM), pp. 440–454.
ICLPICLP-2008-MuggletonST #bias #declarative #logic programming #named #using
TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLPICLP-2008-Santos #bias #declarative #logic programming #named #using
TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICLPICLP-2008-Tsitovich #detection #model checking #security #using
Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
ICSTICST-2008-HaslingGB #case study #modelling #requirements #testing #uml #using
Model Based Testing of System Requirements using UML Use Case Models (BH, HG, KB), pp. 367–376.
ICSTICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented #using
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
ICSTICST-2008-RingsNG #grid #testing #using #workflow
Testing Grid Application Workflows Using TTCN-3 (TR, HN, JG), pp. 210–219.
ICSTICST-2008-SherriffW #composition #empirical #impact analysis #using
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
ICSTICST-2008-WareWS #metric #predict
The Use of Intra-Release Product Measures in Predicting Release Readiness (MPW, FGW, MS), pp. 230–237.
IJCARIJCAR-2008-MouraB #effectiveness #logic #set #using
Deciding Effectively Propositional Logic Using DPLL and Substitution Sets (LMdM, NB), pp. 410–425.
ISSTAISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named #using
Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
ISSTAISSTA-2008-DoR #analysis #modelling #testing #using
Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTAISSTA-2008-JeffreyGG #fault #locality #using
Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
LICSLICS-2008-Burel #deduction #first-order #representation #type system #using
A First-Order Representation of Pure Type Systems Using Superdeduction (GB), pp. 253–263.
MBTMBT-2008-Jurjens #case study #modelling #security #testing #using
Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
RTARTA-2008-MoserS #polynomial #proving #using
Proving Quadratic Derivational Complexities Using Context Dependent Interpretations (GM, AS), pp. 276–290.
ICSTSAT-2008-EibachPV #satisfiability #using
Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
ICSTSAT-2008-KottlerKS08a #bound #np-hard #satisfiability #subclass #using
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
FATESTestCom-FATES-2008-DangN #generative #hybrid #testing #using
Using Disparity to Enhance Test Generation for Hybrid Systems (TD, TN), pp. 54–69.
CBSECBSE-2007-FornasierWG #component #composition #named #programming #runtime #using
Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL (PF, JW, IG), pp. 227–241.
ECSAECSA-2007-FuentesGPV #architecture #using
Using Connectors to Model Crosscutting Influences in Software Architectures (LF, NG, MP, JAV), pp. 292–295.
ECSAECSA-2007-OrtizPAAS #approach #architecture #case study #component #experience #framework #using
Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, , PS), pp. 335–338.
QoSAQoSA-2007-PaceC #architecture #design #quality #using
Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
WICSAWICSA-2007-RossoM #approach #architecture #knowledge-based #scalability #using
Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
ASEASE-2007-CabotCR #constraints #modelling #named #ocl #programming #uml #using #verification
UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming (JC, RC, DR), pp. 547–548.
ASEASE-2007-ChenM #concurrent #source code #testing #using
Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
ASEASE-2007-ClauseDOP #effectiveness #memory management #using
Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
ASEASE-2007-LemosBOMMBL #named #reuse #source code #using
CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASEASE-2007-MajumdarX #generative #testing #using
Directed test generation using symbolic grammars (RM, RGX), pp. 134–143.
ASEASE-2007-NaslavskyR #modelling #testing #traceability #using
Using traceability to support model-based regression testing (LN, DJR), pp. 567–570.
ASEASE-2007-PoshyvanykM #design #incremental #information retrieval #using
Using information retrieval to support design of incremental change of software (DP, AM), pp. 563–566.
CASECASE-2007-AramakiNKHT #interface #knowledge base #using
Human-Robot Interface by using frame like knowledge base (SA, TN, MK, YH, TT), pp. 729–734.
CASECASE-2007-BasileCT #fault #online #using
Improving on-line fault diagnosis for discrete event systems using time (FB, PC, GDT), pp. 26–32.
CASECASE-2007-BukkapatnamK #monitoring #using
Container Integrity and Condition Monitoring using RF Vibration Sensor Tags (STSB, RK), pp. 585–590.
CASECASE-2007-ChalfounBKP #fault #matrix #using
Calibration Using Generalized Error Matrices of a Long Reach Articulated Carrier (JC, CB, DK, YP), pp. 777–782.
CASECASE-2007-FalkmanLA #specification #using
Specification of Production Systems using PPN and Sequential Operation Charts (PF, BL, KA), pp. 20–25.
CASECASE-2007-FontanelliRS #algorithm #locality #metric #performance #using
A Fast RANSAC-Based Registration Algorithm for Accurate Localization in Unknown Environments using LIDAR Measurements (DF, LR, SS), pp. 597–602.
CASECASE-2007-Gonzalez-CastoloL #approximate #fuzzy #petri net #using
Approximating State of DES Using Fuzzy Timed Petri Nets (JCGC, ELM), pp. 722–728.
CASECASE-2007-JacksonCM
A Rationale for the use of Optical Mice Chips for Economic and Accurate Vehicle Tracking (JDJ, DWC, JM), pp. 939–944.
CASECASE-2007-KimCAY #mobile #using
RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
CASECASE-2007-KimLSSZ #approach #biology #metric #performance #using
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
CASECASE-2007-KimLSSZ07a #approach #biology #metric #performance #using
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
CASECASE-2007-LamLY #automation #framework #sketching #using
Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
CASECASE-2007-LiuWL #algorithm #design #effectiveness #multi #product line #search-based #towards #using
Towards Effective Multi-platforming Design of Product Family using Genetic Algorithm (ZL, YSW, KSL), pp. 300–305.
CASECASE-2007-LjungkrantzA #case study #component #industrial #library #logic #programming #using
A Study of Industrial Logic Control Programming using Library Components (OL, ), pp. 117–122.
CASECASE-2007-LuHF #network #process #robust #smarttech #using
Creating Robust Activity Maps Using Wireless Sensor Network in a Smart Home (CHL, YcH, LCF), pp. 741–746.
CASECASE-2007-LuimulaSPPAL #mobile #ubiquitous #using
Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
CASECASE-2007-McVittieSMMLHM #automation #classification #using
Automated Classification of Macrophage Membrane Integrity using a Fluorescent Live/Dead Stain (PM, CSS, TWM, SM, MEL, MH, DRM), pp. 554–559.
CASECASE-2007-MitaniYH #analysis #using
Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASECASE-2007-SarkisSD #automation #modelling #parametricity #using
Modeling the Variation of the Intrinsic Parameters of an Automatic Zoom Camera System using Moving Least-Squares (MS, CTS, KD), pp. 560–565.
CASECASE-2007-WangLS #injection #using
Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
CASECASE-2007-YamamotoFI #3d #metric #multi #performance #using
A High-Speed 3D Shape Measurement System Using a Multi-Sided Mirror (KY, HF, II), pp. 823–828.
CASECASE-2007-YogeswaranPT #algorithm #heuristic #hybrid #problem #search-based #using
An hybrid heuristic using genetic algorithm and simulated annealing algorithm to solve machine loading problem in FMS (MY, SGP, MKT), pp. 182–187.
CASECASE-2007-YoonHMSR #algorithm #image #navigation #performance #using
Efficient Navigation Algorithm Using 1D Panoramic Images (SY, WH, SKM, YS, KSR), pp. 536–541.
CASECASE-2007-YuanZCC #automation #using
Automatic Mixing of Bio-Samples Using Micro-Channel and Centrifugation (LY, YFZ, WC, MC), pp. 634–639.
CASECASE-2007-ZuHT #coordination #generative #integer #linear #programming #using
Trajectory Generation in Relative Velocity Coordinates Using Mixed Integer Linear Programming with IHDR Guidance (DZ, JH, DT), pp. 1125–1130.
DACDAC-2007-AksoyCFM #metric #optimisation #using
Optimization of Area in Digital FIR Filters using Gate-Level Metrics (LA, EACdC, PFF, JCM), pp. 420–423.
DACDAC-2007-ChenL #statistics #testing #using
Extraction of Statistical Timing Profiles Using Test Data (YYC, JJL), pp. 509–514.
DACDAC-2007-CzajkowskiB #using
Using Negative Edge Triggered FFs to Reduce Glitching Power in FPGA Circuits (TSC, SDB), pp. 324–329.
DACDAC-2007-DengBWYZ #named #performance #satisfiability #using
EHSAT: An Efficient RTL Satisfiability Solver Using an Extended DPLL Procedure (SD, JB, WW, XY, YZ), pp. 588–593.
DACDAC-2007-DongL #performance #simulation #using
Accelerating Harmonic Balance Simulation Using Efficient Parallelizable Hierarchical Preconditioning (WD, PL), pp. 436–439.
DACDAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics #using
Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DACDAC-2007-GhodratLR #analysis #estimation #hybrid #using
Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DACDAC-2007-HallschmidS #automation #energy #modelling #using
Automatic Cache Tuning for Energy-Efficiency using Local Regression Modeling (PH, RS), pp. 732–737.
DACDAC-2007-KangKIAR #estimation #metric #online #reliability #using
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
DACDAC-2007-KangKR #design #power management #using
Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop (KK, KK, KR), pp. 934–939.
DACDAC-2007-KocKEO #embedded #memory management #multi #using
Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
DACDAC-2007-LiuLC #algorithm #approximate #multi #optimisation #using
A Provably Good Approximation Algorithm for Power Optimization Using Multiple Supply Voltages (HYL, WPL, YWC), pp. 887–890.
DACDAC-2007-RamalingamSNOP #analysis #composition #modelling #using
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DACDAC-2007-YeZL #optimisation #performance #power management #statistics #using
Statistical Leakage Power Minimization Using Fast Equi-Slack Shell Based Optimization (XY, YZ, PL), pp. 853–858.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DACDAC-2007-ZhuGSDK #architecture #power management #towards #using
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors (CZ, Z(G, LS, RPD, RGK), pp. 312–317.
DATEDATE-2007-AnisN #architecture #debugging #interactive #low cost #using
Interactive presentation: Low cost debug architecture using lossy compression for silicon debug (EA, NN), pp. 225–230.
DATEDATE-2007-BorremansLWR #analysis #multi #using
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATEDATE-2007-ChangLR #performance #using
Improve CAM power efficiency using decoupled match line scheme (YJC, YHL, SJR), pp. 165–170.
DATEDATE-2007-CiesielskiAGGB #data flow #diagrams #using
Data-flow transformations using Taylor expansion diagrams (MJC, SA, DGP, JG, EB), pp. 455–460.
DATEDATE-2007-ClausZMS #configuration management #hardware #using #video
Using partial-run-time reconfigurable hardware to accelerate video processing in driver assistance system (CC, JZ, FHM, WS), pp. 498–503.
DATEDATE-2007-ErdoganO #analysis #using
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-FaragES #2d #configuration management #using
Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
DATEDATE-2007-GhoshBR #adaptation #scheduling #synthesis #using
Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling (SG, SB, KR), pp. 1532–1537.
DATEDATE-2007-GuptaOJWB #comprehension #distributed #multi #network #using
Understanding voltage variations in chip multiprocessors using a distributed power-delivery network (MSG, JLO, RJ, GYW, DMB), pp. 624–629.
DATEDATE-2007-HaastregtK #interactive #optimisation #performance #random #using
Interactive presentation: Feasibility of combined area and performance optimization for superscalar processors using random search (SvH, PMWK), pp. 606–611.
DATEDATE-2007-HosseinabadyDN #testing #using
Using the inter- and intra-switch regularity in NoC switch testing (MH, AD, ZN), pp. 361–366.
DATEDATE-2007-HuangT #analysis #correlation #multi #performance #using
Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATEDATE-2007-KhanATE #algorithm #implementation #pipes and filters #sorting
A new pipelined implementation for minimum norm sorting used in square root algorithm for MIMO-VBLAST systems (ZK, TA, JST, ATE), pp. 1569–1574.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code #using
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-KroeningS #image #interactive #proving #refinement #using #word
Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs (DK, NS), pp. 1325–1330.
DATEDATE-2007-LaouamriA #framework #network #testing #using
Remote testing and diagnosis of System-on-Chips using network management frameworks (OL, CA), pp. 373–378.
DATEDATE-2007-LataireVP #design #interactive #multi #optimisation #using
Interactive presentation: Optimizing analog filter designs for minimum nonlinear distortions using multisine excitations (JL, GV, RP), pp. 267–272.
DATEDATE-2007-MangassarianVSNA #estimation #process #pseudo #satisfiability #using
Maximum circuit activity estimation using pseudo-boolean satisfiability (HM, AGV, SS, FNN, MSA), pp. 1538–1543.
DATEDATE-2007-MarianiBC #design #using
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
DATEDATE-2007-MuellerGS #design #polynomial #programming #trade-off #using
Trade-off design of analog circuits using goal attainment and “Wave Front” sequential quadratic programming (DM, HEG, US), pp. 75–80.
DATEDATE-2007-NardiTNAGLS #analysis #design #statistics
Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATEDATE-2007-ParkPH #memory management #novel #stack
A novel technique to use scratch-pad memory for stack management (SP, HwP, SH), pp. 1478–1483.
DATEDATE-2007-QuSN #configuration management #energy #interactive #runtime #scalability #using
Interactive presentation: Using dynamic voltage scaling to reduce the configuration energy of run time reconfigurable devices (YQ, JPS, JN), pp. 147–152.
DATEDATE-2007-RenterghemDVVQ #compilation #development #using
Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
DATEDATE-2007-RousseauMGMLDG #certification #configuration management #using
Enabling certification for dynamic partial reconfiguration using a minimal flow (BR, PM, DG, DM, JDL, FD, YG), pp. 983–988.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-SheldonVL #design #interactive #paradigm #using
Interactive presentation: Soft-core processor customization using the design of experiments paradigm (DS, FV, SL), pp. 821–826.
DATEDATE-2007-TadesseSLBG #analysis #modelling #satisfiability #using
Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATEDATE-2007-TongbongMC #evaluation #interactive #metric #multi #statistics #testing #using
Interactive presentation: Evaluation of test measures for LNA production testing using a multinormal statistical model (JT, SM, JLC), pp. 731–736.
DATEDATE-2007-WangCW #optimisation #scheduling #testing #using
SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling (ZW, KC, SW), pp. 201–206.
DATEDATE-2007-Wong #equation #performance #symmetry #using
Fast positive-real balanced truncation of symmetric systems using cross Riccati equations (NW), pp. 1496–1501.
DATEDATE-2007-YeungTB #framework #interactive #interface #multi #novel
Interactive presentation: Novel test infrastructure and methodology used for accelerated bring-up and in-system characterization of the multi-gigahertz interfaces on the cell processor (PY, AT, PB), pp. 725–730.
DATEDATE-2007-YonedaIF #algorithm #configuration management #interactive #scheduling #using
Interactive presentation: An SoC test scheduling algorithm using reconfigurable union wrappers (TY, MI, HF), pp. 231–236.
DATEDATE-2007-ZhouB #approach #reduction #scheduling #testing #using
Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
DocEngDocEng-2007-Storey #documentation #folksonomy #navigation #ontology #taxonomy #using
Navigating documents using ontologies, taxonomies and folksonomies (MADS), p. 2.
DRRDRR-2007-KimLT #documentation #identification #online #using
Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
DRRDRR-2007-Likforman-SulemS #network #recognition #using
Recognition of degraded handwritten digits using dynamic Bayesian networks (LLS, MS).
DRRDRR-2007-ShettySBS #documentation #random #segmentation #using
Segmentation and labeling of documents using conditional random fields (SS, HS, MJB, SNS).
HTHT-2007-ChinC #hypermedia #identification #social #using
Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
HTHT-2007-FigueiraL #interactive #learning #using #visualisation
Interaction visualization in web-based learning using igraphs (ÁRF, JBL), pp. 45–46.
HTHT-2007-LeblancA #learning #using
Using forum in an organizational learning context (AL, MHA), pp. 41–42.
HTHT-2007-MasonT #case study #network #social
Tags, networks, narrative: exploring the use of social software for the study of narrative in digital contexts (BLM, ST), pp. 39–40.
HTHT-2007-NelsonSM #hypermedia
Back to the future: hypertext the way it used to be (THN, RAS, MM), pp. 227–228.
HTHT-2007-SinclairML #using #wiki
Dynamic link service 2.0: using wikipedia as a linkbase (PASS, KM, PHL), pp. 161–162.
ICDARICDAR-2007-BernardAH #random #recognition #using
Using Random Forests for Handwritten Digit Recognition (SB, SA, LH), pp. 1043–1047.
ICDARICDAR-2007-BhardwajSSS #on the #verification
On the Use of Lexeme Features for Writer Verification (AB, AS, HS, SNS), pp. 1088–1092.
ICDARICDAR-2007-BrinkSB #identification #towards #using #verification
Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
ICDARICDAR-2007-ChouGC #classification #multi #recognition #using
Recognition of Fragmented Characters Using Multiple Feature-Subset Classifiers (CHC, CYG, FC), pp. 198–202.
ICDARICDAR-2007-CostagliolaDR #diagrams #grammarware #sketching #using
Using Grammar-Based Recognizers for Symbol Completion in Diagrammatic Sketches (GC, VD, MR), pp. 1078–1082.
ICDARICDAR-2007-DasariB #identification #using
Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
ICDARICDAR-2007-FinkP #modelling #on the #recognition
On the Use of Context-Dependent Modeling Units for HMM-Based Offline Handwriting Recognition (GAF, TP), pp. 729–733.
ICDARICDAR-2007-FujimotoSTSN #documentation #image #parallel #programming #using
Curved paper rectification for digital camera document images by shape from parallel geodesics using continuous dynamic programming (KF, JS, HT, MS, SN), pp. 267–271.
ICDARICDAR-2007-Furmaniak #segmentation #using
Unsupervised Newspaper Segmentation Using Language Context (RF), pp. 1263–1267.
ICDARICDAR-2007-GaoWHD #documentation #image #integer #linear #programming #using
Decompose Document Image Using Integer Linear Programming (DG, YW, HH, MD), pp. 397–401.
ICDARICDAR-2007-GazzahA #analysis #identification #using
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-HamamuraAI #algorithm #probability #recognition #using #word
An Analytic Word Recognition Algorithm Using a Posteriori Probability (TH, TA, BI), pp. 669–673.
ICDARICDAR-2007-HirayamaNK #classification #difference #using
A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace (JH, HN, NK), pp. 432–436.
ICDARICDAR-2007-HuangLM #string #using
Cryptogram Decoding for OCR Using Numerization Strings (GBH, EGLM, AM), pp. 208–212.
ICDARICDAR-2007-HuangSHFN #approach #difference #recognition #using
An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
ICDARICDAR-2007-HummIH #modelling #statistics #using #verification
Spoken Handwriting Verification Using Statistical Models (AH, RI, JH), pp. 999–1003.
ICDARICDAR-2007-ImdadBERE #identification #using
Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
ICDARICDAR-2007-JinZ #synthesis #using
Synthesis of Chinese Character Using Affine Transformation (LJ, XZ), pp. 218–222.
ICDARICDAR-2007-KeshariW #hybrid #recognition #using
Hybrid Mathematical Symbol Recognition Using Support Vector Machines (BK, SMW), pp. 859–863.
ICDARICDAR-2007-KramerKKB #finite #metadata #probability #transducer #using
Bibliographic Meta-Data Extraction Using Probabilistic Finite State Transducers (MK, HK, DK, TMB), pp. 609–613.
ICDARICDAR-2007-KunduHHPG #recognition #using
Arabic Handwriting Recognition Using Variable Duration HMM (AK, TH, BH, JP, LVG), pp. 644–648.
ICDARICDAR-2007-Likforman-SulemS #network #recognition #using
Recognition of Broken Characters from Historical Printed Books Using Dynamic Bayesian Networks (LLS, MS), pp. 173–177.
ICDARICDAR-2007-LiwickiIB #detection #online #programming #using
On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
ICDARICDAR-2007-LouloudisGH #approach #detection #documentation #using
Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
ICDARICDAR-2007-LuthyVB #markov #modelling #segmentation #using
Using Hidden Markov Models as a Tool for Handwritten Text Line Segmentation (FL, TV, HB), p. 8–?.
ICDARICDAR-2007-NamboodiriNJ #on the #using
On Using Classical Poetry Structure for Indian Language Post-Processing (AMN, PJN, CVJ), pp. 1238–1242.
ICDARICDAR-2007-NguyenBML #classification #using #verification
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDARICDAR-2007-NicolasDPH #2d #documentation #image #random #segmentation #using
Document Image Segmentation Using a 2D Conditional Random Field Model (SN, JD, TP, LH), pp. 407–411.
ICDARICDAR-2007-PanBS #segmentation #using
Text Segmentation from Complex Background Using Sparse Representations (WP, TDB, CYS), pp. 412–416.
ICDARICDAR-2007-PrasanthBSRM #online #using
Elastic Matching of Online Handwritten Tamil and Telugu Scripts Using Local Features (LP, VB, RS, GVR, DM), pp. 1028–1032.
ICDARICDAR-2007-PrusaH #2d #recognition #using
Mathematical Formulae Recognition Using 2D Grammars (DP, VH), pp. 849–853.
ICDARICDAR-2007-QuiniouA #detection #fault #network #online #recognition
Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
ICDARICDAR-2007-RinglstetterRGS #fault
Deriving Symbol Dependent Edit Weights for Text Correction_The Use of Error Dictionaries (CR, UR, AG, KUS), pp. 639–643.
ICDARICDAR-2007-SekiFNSM #analysis #documentation #information management #using
Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDARICDAR-2007-ShettySS #random #recognition #using #word
Handwritten Word Recognition Using Conditional Random Fields (SS, HS, SNS), pp. 1098–1102.
ICDARICDAR-2007-TanakaG #using
Autonomous Text Capturing Robot Using Improved DCT Feature and Text Tracking (MT, HG), pp. 1178–1182.
ICDARICDAR-2007-TonouchiK #mobile #online #recognition #using
Text Input System Using Online Overlapped Handwriting Recognition for Mobile Devices (YT, AK), pp. 754–758.
ICDARICDAR-2007-ToujAA #segmentation #using
Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
ICDARICDAR-2007-WendlingR #recognition #using
Symbol Recognition Using a 2-class Hierarchical Model of Choquet Integrals (LW, JR), pp. 634–638.
ICDARICDAR-2007-WickRL #fault #modelling #topic #using
Context-Sensitive Error Correction: Using Topic Models to Improve OCR (MLW, MGR, EGLM), pp. 1168–1172.
ICDARICDAR-2007-YangJ #kernel #recognition #using
Handwritten Chinese Character Recognition Using Modified LDA and Kernel FDA (DY, LJ), pp. 914–918.
ICDARICDAR-2007-YangJZH #recognition #using
Finger-Written Chinese Characters Recognition Using Hierarchical LDA (DY, LJ, LXZ, JCH), pp. 322–326.
ICDARICDAR-2007-ZhangYT #documentation #image #using
Removing Shading Distortions in Camera-based Document Images Using Inpainting and Surface Fitting With Radial Basis Functions (LZ, AMY, CLT), pp. 984–988.
ICDARICDAR-2007-ZiaratbanFE
Use of Legal Amount to Confirm or Correct the Courtesy Amount on Farsi Bank Checks (MZ, KF, ME), pp. 1123–1127.
ICDARICDAR-2007-ZiaratbanFF #feature model #recognition #using
Language-Based Feature Extraction Using Template-Matching In Farsi/Arabic Handwritten Numeral Recognition (MZ, KF, FF), pp. 297–301.
SIGMODSIGMOD-2007-BandiMAA #algorithm #data type #performance #using
Fast data stream algorithms using associative memories (NB, AM, DA, AEA), pp. 247–256.
SIGMODSIGMOD-2007-ChandyG #database #using
Event processing using database technology (KMC, DG), pp. 1169–1170.
SIGMODSIGMOD-2007-FaloutsosKS #graph #matrix #mining #scalability #tool support #using
Mining large graphs and streams using matrix and tensor tools (CF, TGK, JS), p. 1174.
SIGMODSIGMOD-2007-FangHLYGLS #named #query #using
GPUQP: query co-processing using graphics processors (RF, BH, ML, KY, NKG, QL, PVS), pp. 1061–1063.
SIGMODSIGMOD-2007-LarsonLZZ #assurance #estimation #quality #using
Cardinality estimation using sample views with quality assurance (PÅL, WL, JZ, PZ), pp. 175–186.
SIGMODSIGMOD-2007-NandiJ #interface #query #using
Assisted querying using instant-response interfaces (AN, HVJ), pp. 1156–1158.
SIGMODSIGMOD-2007-TufteLMPBR #estimation #using
Travel time estimation using NiagaraST and latte (KT, JL, DM, VP, RLB, JR), pp. 1091–1093.
SIGMODSIGMOD-2007-ZhouGBN #query #using
Query relaxation using malleable schemas (XZ, JG, WTB, WN), pp. 545–556.
VLDBVLDB-2007-AbadiMMH #clustering #data transformation #scalability #semantics #using #web
Scalable Semantic Web Data Management Using Vertical Partitioning (DJA, AM, SM, KJH), pp. 411–422.
VLDBVLDB-2007-BhattacharyaMS #distributed #modelling #named #network #query #statistics #using
MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models (AB, AM, AKS), pp. 854–865.
VLDBVLDB-2007-Helmer #documentation #similarity #using
Measuring the Structural Similarity of Semistructured Documents Using Entropy (SH), pp. 1022–1032.
VLDBVLDB-2007-LimWW #using
Unifying Data and Domain Knowledge Using Virtual Views (LL, HW, MW), pp. 255–266.
VLDBVLDB-2007-LitwinMRS #algebra #performance #string #using
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
VLDBVLDB-2007-LiuWC #keyword #named #semantics #using #xml
XSeek: A Semantic XML Search Engine Using Keywords (ZL, JW, YC), pp. 1330–1333.
VLDBVLDB-2007-LiWY #approximate #named #performance #query #string #using
VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams (CL, BW, XY), pp. 303–314.
VLDBVLDB-2007-PapadomanolakisDA #automation #database #design #performance #query
Efficient Use of the Query Optimizer for Automated Database Design (SP, DD, AA), pp. 1093–1104.
VLDBVLDB-2007-ShenDNR #datalog #declarative #embedded #information management #using
Declarative Information Extraction Using Datalog with Embedded Extraction Predicates (WS, AD, JFN, RR), pp. 1033–1044.
VLDBVLDB-2007-ZinnBG #modelling #query #using
Modeling and Querying Vague Spatial Objects Using Shapelets (DZ, JB, MG), pp. 567–578.
CSEETCSEET-2007-CarverHHHR #programming #re-engineering #student #using
Increased Retention of Early Computer Science and Software Engineering Students Using Pair Programming (JCC, LH, LH, JEH, DSR), pp. 115–122.
CSEETCSEET-2007-Chao #collaboration #student #using #wiki
Student Project Collaboration Using Wikis (JC), pp. 255–261.
CSEETCSEET-2007-McGregorBBBK #architecture #education #reasoning #using
Using an Architecture Reasoning Tool to Teach Software Architecture (JDM, FB, LB, PB, MK), pp. 275–282.
CSEETCSEET-2007-Padua #development #modelling #using
Using Model-Driven Development in Time-Constrained Course Projects (WP), pp. 133–140.
CSEETCSEET-2007-RootRT #concept #re-engineering
Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
CSEETCSEET-2007-Staron #analysis #learning #student #using
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEETCSEET-2007-Taran #education #game studies #re-engineering #risk management #using
Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
ITiCSEITiCSE-2007-CaronnaSMIHT #predict #using
Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
ITiCSEITiCSE-2007-DistasioW #education #framework #game studies #using
Inclusive computer science education using a ready-made computer game framework (JD, TPW), pp. 116–120.
ITiCSEITiCSE-2007-FreireFPT #education #using #web
Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
ITiCSEITiCSE-2007-GorraLC #assessment #database #student
An account of the use of synoptic assessment for students in the area of databases at level 2 (AG, SL, JC), p. 334.
ITiCSEITiCSE-2007-Impagliazzo #approach #source code #using
Using an outcome-based approach to assess computing programs (JI), p. 344.
ITiCSEITiCSE-2007-KheirW #realtime #speech #student #using
Inclusion of deaf students in computer science classes using real-time speech transcription (RK, TW), pp. 261–265.
ITiCSEITiCSE-2007-LevyB #education #tool support
We work so hard and they don’t use it: acceptance of software tools by teachers (RBBL, MBA), pp. 246–250.
ITiCSEITiCSE-2007-Lewis #student #word
Are pictures worth 1000 words? the use of affective imagery surveys to capture student perceptions of the computing discipline (TLL), p. 312.
ITiCSEITiCSE-2007-OliverGMA #learning #using
Using disruptive technology for explorative learning (IO, KG, AM, CA), pp. 96–100.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #using #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
ESOPESOP-2007-LeinoS #invariant #using #verification
Using History Invariants to Verify Observers (KRML, WS), pp. 80–94.
FASEFASE-2007-KleinG #diagrams #specification #using
Joint Structural and Temporal Property Specification Using Timed Story Scenario Diagrams (FK, HG), pp. 185–199.
FASEFASE-2007-Whittle #case study #precise #specification
Precise Specification of Use Case Scenarios (JW), pp. 170–184.
FoSSaCSFoSSaCS-2007-BengtsonP #formal method #logic #using #π-calculus
Formalising the π-Calculus Using Nominal Logic (JB, JP), pp. 63–77.
TACASTACAS-2007-YuCL #bound #diagrams #reachability #using
Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
CSMRCSMR-2007-BeszedesGFGF #evolution #metric
The Dynamic Function Coupling Metric and Its Use in Software Evolution (ÁB, TG, SF, TG, FF), pp. 103–112.
CSMRCSMR-2007-BrandBEJKKSV #ide #legacy #maintenance #using
Using The Meta-Environment for Maintenance and Renovation (MvdB, MB, GRE, HAdJ, PK, ATK, TvdS, JJV), pp. 331–332.
CSMRCSMR-2007-LoeschP #concept analysis #product line #using #variability
Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
CSMRCSMR-2007-Lormans #evolution #monitoring #requirements #using
Monitoring Requirements Evolution using Views (ML), pp. 349–352.
ICPCICPC-2007-CornelissenHZMWD #comprehension #execution #sequence #using
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views (BC, DH, AZ, LM, JJvW, AvD), pp. 49–58.
ICPCICPC-2007-HeldalSS #case study #interactive #visualisation
Scenario Explorer: Interactive Visualization of Use Cases (RH, JS, OS), pp. 241–252.
ICPCICPC-2007-MirarabHT #co-evolution #network #predict #using
Using Bayesian Belief Networks to Predict Change Propagation in Software Systems (SM, AH, LT), pp. 177–188.
ICPCICPC-2007-StefikAPB #debugging #named #using
WAD: A Feasibility study using the Wicked Audio Debugger (AS, RTA, RP, JB), pp. 69–80.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-Anda #maintenance #metric #using
Assessing Software System Maintainability using Structural Measures and Expert Assessments (BA), pp. 204–213.
ICSMEICSM-2007-AntoniolGMT #evolution #mining
Mining the Lexicon Used by Programmers during Sofware Evolution (GA, YGG, EM, PT), pp. 14–23.
ICSMEICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing #using
Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSMEICSM-2007-GustavssonLLMB #development #distributed #maintenance #modelling #uml #using
Simplifying maintenance by using XSLT to unlock UML models in a distributed development environment (HG, BL, BL, AM, MB), pp. 465–468.
ICSMEICSM-2007-LuccaFT #classification #concept analysis #using #web
Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
ICSMEICSM-2007-Salahuddin #testing #using
Analysing the Impact of Change on Test Sets Using X-Machines (SS), pp. 511–512.
ICSMEICSM-2007-Vivanco #approach #modelling #predict #quality #using
Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
ICSMEICSM-2007-WalkinshawRW #feature model #using
Feature Location and Extraction using Landmarks and Barriers (NW, MR, MW), pp. 54–63.
MSRMSR-2007-German #open source #using
Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects (DMG), p. 24.
MSRMSR-2007-HerraizGR07a #analysis #eclipse #using
Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux #using
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSRMSR-2007-Masticola #development #lightweight #mining #repository #using
Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
MSRMSR-2007-ValettoHECWW #congruence #development #repository #using
Using Software Repositories to Investigate Socio-technical Congruence in Development Projects (GV, MEH, KE, SC, MNW, CW), p. 25.
SCAMSCAM-2007-MolinaS #approximate #open source #performance #source code #using
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
SCAMSCAM-2007-RodenVEM #agile #empirical #metric #modelling #process #quality #using
An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes (PLR, SV, LHE, SLM), pp. 171–179.
WCREWCRE-2007-McNairGW #architecture #evolution #using #visualisation
Visualizing Software Architecture Evolution Using Change-Sets (AM, DMG, JHWJ), pp. 130–139.
WCREWCRE-2007-RaberL #data mining #debugging #mining #using
Emulated Breakpoint Debugger and Data Mining Using Detours (JR, EL), pp. 271–272.
WCREWCRE-2007-Staiger #analysis #reverse engineering #user interface #using #visual notation
Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
PEPMPEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code #using
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics #using
Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
PLDIPLDI-2007-HaRDRRPCW #black box #component #fault
Improved error reporting for software that uses black-box components (JH, CJR, JVD, IR, HER, DEP, DLC, EW), pp. 101–111.
PLDIPLDI-2007-RamanathanGJ #mining #specification #using
Static specification inference using predicate mining (MKR, AG, SJ), pp. 123–134.
SASSAS-2007-SankaranarayananIG #program analysis #using
Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
SASSAS-2007-Tip #constraints #refactoring #using
Refactoring Using Type Constraints (FT), pp. 1–17.
CIAACIAA-2007-Marschner #transducer #using
Efficiently Matching with Local Grammars Using Prefix Overlay Transducers (CM), pp. 314–316.
CIAACIAA-2007-Paun #transducer
Spiking Neural P Systems Used as Acceptors and Transducers (GP), pp. 1–4.
LATALATA-2007-KutribM #automaton #performance #recognition #using
Fast Reversible Language Recognition Using Cellular Automata (MK, AM), pp. 331–342.
IFMIFM-2007-HasanT #cumulative #probability #using #verification
Verification of Probabilistic Properties in HOL Using the Cumulative Distribution Function (OH, ST), pp. 333–352.
IFMIFM-2007-PlaggeL #model checking #specification #using #validation
Validating Z Specifications Using the ProBAnimator and Model Checker (DP, ML), pp. 480–500.
IFMIFM-2007-PodorozhnyKPZ #alloy #multi #using #verification
Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
IFMIFM-2007-SinnigCK #case study #modelling #semantics
Common Semantics for Use Cases and Task Models (DS, PC, FK), pp. 579–598.
SEFMSEFM-2007-CrockerC #automation #c #reasoning #source code #using #verification
Verification of C Programs Using Automated Reasoning (DC, JC), pp. 7–14.
SEFMSEFM-2007-Lano #diagrams #interactive #specification #using
Formal Specification using Interaction Diagrams (KL), pp. 293–304.
SEFMSEFM-2007-SahaRC #modelling #protocol #using #verification
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
SEFMSEFM-2007-SampathRSR #case study #generative #how #using
How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
CEFPCEFP-2007-KozsikCHKKLNTV #case study #erlang #refactoring
Use Cases for Refactoring in Erlang (TK, ZC, ZH, RK, RK, LL, TN, MT, ANV), pp. 250–285.
ICFPICFP-2007-BeshersFS #case study #experience #functional #linux #programming #using
Experience report: using functional programming to manage a linux distribution (CB, DF, JS), pp. 213–218.
ICFPICFP-2007-MarlowYJ #lazy evaluation #performance #pointer #using
Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
IFLIFL-2007-Kleeblatt #dependent type #using
Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
IFLIFL-2007-NaylorR #graph #reduction #using
The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA (MN, CR), pp. 129–146.
LISPILC-2007-Borden #classification #using
Classification using conditional probabilities and Shannon’s definition of information (AB), p. 15.
LISPILC-2007-HerzeelGCD #e-commerce #lisp #using
Modularizing crosscuts in an e-commerce application in Lisp using HALO (CH, KG, PC, TD), p. 11.
AGTIVEAGTIVE-2007-AschenbrennerG #graph #graph grammar #using
Transforming Scene Graphs Using Triple Graph Grammars — A Practice Report (NA, LG), pp. 32–43.
AGTIVEAGTIVE-2007-BiermannEET #eclipse #editing #generative #plugin #using
Generating Eclipse Editor Plug-Ins Using Tiger (EB, KE, CE, GT), pp. 583–584.
AGTIVEAGTIVE-2007-EngelsGSW #consistency #contract #modelling #process #using #visual notation #web #web service
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts (GE, BG, CS, HW), pp. 17–31.
AGTIVEAGTIVE-2007-GogollaBD #graph transformation #ocl #using
From Graph Transformation to OCL Using USE (MG, FB, DHD), pp. 585–586.
AGTIVEAGTIVE-2007-LeenheerM #collaboration #evolution #graph transformation #ontology #using
Using Graph Transformation to Support Collaborative Ontology Evolution (PDL, TM), pp. 44–58.
GT-VMTGT-VMT-2007-BisztrayH #csp #process #using #verification
Rule-Level Verification of Business Process Transformations using CSP (DB, RH).
GT-VMTGT-VMT-2007-BonevaHKR #graph transformation #multi #simulation #using
Simulating Multigraph Transformations Using Simple Graphs (IB, FH, HK, AR).
CHICHI-2007-BirnholtzGMB #case study #process #scalability #using
An exploratory study of input configuration and group process in a negotiation task using a large display (JPB, TG, CM, RB), pp. 91–100.
CHICHI-2007-CherubiniVDK #developer #how #why
Let’s go to the whiteboard: how and why software developers use drawings (MC, GV, RD, AJK), pp. 557–566.
CHICHI-2007-DingEKLCSWB #empirical #visual notation
An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC (XD, TE, WAK, SL, JC, JBS, TVW, WEB), pp. 1019–1028.
CHICHI-2007-HurstHM #detection
Dynamic detection of novice vs. skilled use without a task model (AH, SEH, JM), pp. 271–280.
CHICHI-2007-KalnikaiteW #memory management #people #why
Software or wetware?: discovering when and why people use digital prosthetic memory (VK, SW), pp. 71–80.
CHICHI-2007-KristenssonZ #gesture #using
Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
CHICHI-2007-KumarPW #named #using
EyePoint: practical pointing and selection using gaze and keyboard (MK, AP, TW), pp. 421–430.
CHICHI-2007-LankCR #predict #using
Endpoint prediction using motion kinematics (EL, YCNC, JR), pp. 637–646.
CHICHI-2007-LudfordPRT #using
Capturing, sharing, and using local place information (PJL, RP, KR, LGT), pp. 1235–1244.
CHICHI-2007-MoravejiLDOW #design #named #using
Comicboarding: using comics as proxies for participatory design with children (NM, JL, JD, PO, SW), pp. 1371–1374.
CHICHI-2007-NenonenLHLJH #game studies #interactive #using
Using heart rate to control an interactive game (VN, AL, VH, TL, MJ, PH), pp. 853–856.
CHICHI-2007-SalvucciMZB #performance
iPod distraction: effects of portable music-player use on driver performance (DDS, DM, MZ, DPB), pp. 243–250.
CHICHI-2007-SchrammelGST #exclamation #quote #using
“Look!”: using the gaze direction of embodied agents (JS, AG, RS, MT), pp. 1187–1190.
CHICHI-2007-SeayK #game studies #online #problem #self
Project massive: self-regulation and problematic use of online gaming (AFS, REK), pp. 829–838.
CHICHI-2007-SellenFAHRW #case study #memory management #using
Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
CHICHI-2007-TangLPWD #interactive #process #using
Recent shortcuts: using recent interactions to support shared activities (JCT, JL, JSP, SW, CD), pp. 1263–1272.
CHICHI-2007-VogelB #interface #named #using
Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
CHICHI-2007-ZhaoDCBB #feedback #named #using
Earpod: eyes-free menu selection using touch input and reactive audio feedback (SZ, PD, MHC, RB, PB), pp. 1395–1404.
HCIDHM-2007-BeurierCMTW #approach #data-driven #database #simulation #using
Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
HCIDHM-2007-EndoKKMKM #assessment #design #using
A Computer-Aided Ergonomic Assessment and Product Design System Using Digital Hands (YE, SK, TK, NM, MK, MM), pp. 833–842.
HCIDHM-2007-FanC #adaptation #using
A Modified Particle Swarm Optimizer Using an Adaptive Dynamic Weight Scheme (SKSF, JMC), pp. 56–65.
HCIDHM-2007-GeorgeG #modelling #using
Facilitating Pronunciation Skills for Children with Phonological Disorders Using Human Modelling (JG, PG), pp. 595–605.
HCIDHM-2007-KimPHL #design #evaluation #using
Evaluation of Navy Shipboard Habitability for a Warship Design Using Human Model (HK, JHP, HH, CML), pp. 884–893.
HCIDHM-2007-LeeFCBEAP #finite #modelling #using
Finite Element Modeling to Aid in Refining the Rehabilitation of Amputees Using Osseointegrated Prostheses (WL, LF, NJC, RB, JE, CA, MJP), pp. 655–658.
HCIDHM-2007-SadasivanG #question
Can We Use Technology to Train Inspectors to Be More Systematic? (SS, AKG), pp. 959–968.
HCIDHM-2007-VolzBHK #automation #generative #linear #metric #using
Automatic, Body Measurements Based Generation of Individual Avatars Using Highly Adjustable Linear Transformation (AV, RB, SH, KK), pp. 453–459.
HCIDHM-2007-WashburnSG #maintenance #multimodal #using
Using Multimodal Technologies to Enhance Aviation Maintenance Inspection Training (CW, PS, AKG), pp. 1018–1026.
HCIDHM-2007-YaoMW #3d #low cost #using
Low Cost 3D Shape Acquisition System Using Strip Shifting Pattern (LY, LM, DW), pp. 276–285.
HCIDHM-2007-ZhaoL #3d #image #locality #orthogonal #using
Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
HCIHCI-AS-2007-KimuraTHTAOT #analysis #approach #using
The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCIHCI-AS-2007-KojimaIN #documentation #using
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-AS-2007-Komatsubara #safety
Ergonomic Study of Medicament Packages for the Improvement of Safety in Use (AK), pp. 484–488.
HCIHCI-AS-2007-LeeNB #monitoring #network #reliability #using
Personal Life Logger and Belonging Monitor Using Reliable ZigBee Networks (KL, KN, CB), pp. 961–970.
HCIHCI-AS-2007-Moallem #enterprise #how
Excellence in Ease of Use with Rich Functionality How Enterprise Software Applications with Rich Functionality Can Be Built to Excel in Ease of Use (AM), pp. 672–681.
HCIHCI-AS-2007-ThengW #learning #usability
Perceived Usefulness and Usability of Weblogs for Collaborating Learning (YLT, ELYW), pp. 361–370.
HCIHCI-AS-2007-YiJ #analysis #approach #online #protocol
The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
HCIHCI-IDU-2007-BaranauskasN #design #flexibility #interactive #using
Using Patterns to Support the Design of Flexible User Interaction (MCCB, VPdAN), pp. 1033–1042.
HCIHCI-IDU-2007-Forsman #experience #human-computer #research #tool support #using
After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
HCIHCI-IDU-2007-Gomez-CarneroI #representation #using
Evaluator of User’s Actions (Eua) Using the Model of Abstract Representation Dgaui (SGC, JRI), pp. 463–471.
HCIHCI-IDU-2007-Karjalainen #analysis #why
Why It Is Difficult to Use a Simple Device: An Analysis of a Room Thermostat (SK), pp. 544–548.
HCIHCI-IDU-2007-LingLX #complexity #using #validation #web
Validating Information Complexity Questionnaires Using Travel Web Sites (CL, ML, JX), pp. 901–910.
HCIHCI-IDU-2007-NingT #functional #how #order #usability
How to Use Emotional Usability to Make the Product Serves a Need Beyond the Traditional Functional Objective to Satisfy the Emotion Needs of the User in Order to Improve the Product Differentiator — Focus on Home Appliance Product (LN, ST), pp. 587–593.
HCIHCI-IDU-2007-OkamotoKGI #design #using
Participatory Design Using Scenarios in Different Cultures (MO, HK, IG, KI), pp. 223–231.
HCIHCI-IDU-2007-StrybelVDKNCG #predict #using
Predicting Perceived Situation Awareness of Low Altitude Aircraft in Terminal Airspace Using Probe Questions (TZS, KPLV, JPD, JK, TKN, VC, FPG), pp. 939–948.
HCIHCI-IDU-2007-TarbyERTLK #architecture #aspect-oriented #comparison #evaluation #interactive #programming #usability #using
Traces Using Aspect Oriented Programming and Interactive Agent-Based Architecture for Early Usability Evaluation: Basic Principles and Comparison (JCT, HE, JR, CDT, PL, CK), pp. 632–641.
HCIHCI-IDU-2007-TranMC #independence #memory management #using
Using Memory Aid to Build Memory Independence (QTT, EDM, GC), pp. 959–965.
HCIHCI-IDU-2007-VogiazouFL #design #process
The Use of Improvisational Role-Play in User Centered Design Processes (YV, JF, JL), pp. 262–272.
HCIHCI-IDU-2007-ZhangA
Attitudes in ICT Acceptance and Use (PZ, SNA), pp. 1021–1030.
HCIHCI-IPT-2007-ChenC #using
Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator (CHC, MLC), pp. 560–568.
HCIHCI-IPT-2007-DzwiarekLNRS #artificial reality #assessment #using #visual notation
Assessment of Perception of Visual Warning Signals Generated Using an Augmented Reality System (MD, AL, AN, CR, TS), pp. 579–586.
HCIHCI-IPT-2007-GalludLTP #experience #interactive #mobile #using
Using Mobile Devices to Improve the Interactive Experience of Visitors in Art Museums (JAG, MDL, RT, VMRP), pp. 280–287.
HCIHCI-IPT-2007-JeonKB #mobile #using
Interacting with a Tabletop Display Using a Camera Equipped Mobile Phone (SJ, GJK, MB), pp. 336–343.
HCIHCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #using #word
Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
HCIHCI-IPT-2007-SongWT #game studies #interface #using
A Tangible Game Interface Using Projector-Camera Systems (PS, SW, JT), pp. 956–965.
HCIHCI-IPT-2007-TsaoCC #concept #design #flexibility #research #smarttech #using
The Research of Using Image-Transformation to the Conceptual Design of Wearable Product with Flexible Display (YCT, LCC, SCC), pp. 1220–1229.
HCIHCI-IPT-2007-YoshidaMS #interactive #mobile #using #visual notation
Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
HCIHCI-MIE-2007-Alexandris #human-computer #quote #semantics #using
“Show and Tell”: Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints (CA), pp. 13–22.
HCIHCI-MIE-2007-ChanCCHH #detection #multi #using
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-ChangKP #constraints #evolution #set #using
Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint (JSC, EYK, SHP), pp. 583–588.
HCIHCI-MIE-2007-ChungK #classification #using
Classification of a Person Picture and Scenery Picture Using Structured Simplicity (MBC, IJK), pp. 821–828.
HCIHCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #using #word
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
HCIHCI-MIE-2007-HanKYJ #mobile #recursion #segmentation
Frame Segmentation Used MLP-Based X-Y Recursive for Mobile Cartoon Content (EH, KK, HY, KJ), pp. 872–881.
HCIHCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics #using
Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCIHCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting #using
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCIHCI-MIE-2007-HirotaWI #interface #using
Menu Selection Using Auditory Interface (KH, YW, YI), pp. 70–75.
HCIHCI-MIE-2007-JangKC #geometry #using #visual notation
Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM (HJ, GYK, HIC), pp. 634–641.
HCIHCI-MIE-2007-JangWB #named #using
MEMORIA: Personal Memento Service Using Intelligent Gadgets (HJ, JW, CB), pp. 331–339.
HCIHCI-MIE-2007-JungKK #estimation #image #modelling #using
Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling (DJJ, KSK, HJK), pp. 649–658.
HCIHCI-MIE-2007-JuSK #game studies #people #quote #using
“Shooting a Bird”: Game System Using Facial Feature for the Handicapped People (JJ, YS, EYK), pp. 642–648.
HCIHCI-MIE-2007-KangEKKASK #modelling #multi #using
Human Motion Modeling Using Multivision (BDK, JSE, JHK, CK, SHA, BJS, SKK), pp. 659–668.
HCIHCI-MIE-2007-KimKEKASK #adaptation #detection #realtime #using
Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
HCIHCI-MIE-2007-KimSK #network #using
Emotion-Based Textile Indexing Using Neural Networks (NYK, YS, EYK), pp. 349–357.
HCIHCI-MIE-2007-KwonPKK #recognition #using
Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift (KSK, SHP, EYK, HJK), pp. 690–699.
HCIHCI-MIE-2007-MehtaC #ontology #using
Developing a Conversational Agent Using Ontologies (MM, AC), pp. 154–164.
HCIHCI-MIE-2007-OguraNS #communication #parallel #thread #using
Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System (KO, KN, KS), pp. 186–195.
HCIHCI-MIE-2007-PeterSVUNJKG #detection #monitoring #performance #usability
EREC-II in Use — Studies on Usability and Suitability of a Sensor System for Affect Detection and Human Performance Monitoring (CP, RS, JV, BU, NN, HJ, KK, RG), pp. 465–474.
HCIHCI-MIE-2007-ReveiuDF #adaptation #multi #retrieval #using
Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation (AR, MD, FF), pp. 486–492.
HCIHCI-MIE-2007-SetiawanHL #interactive #multi #people #using
Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction (NAS, SJH, CWL), pp. 738–746.
HCIHCI-MIE-2007-WangYCI #interactive #interface #multimodal #realtime #using
Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction (HW, JY, MHC, MI), pp. 225–231.
HCIHCI-MIE-2007-YoonK #case study #interactive #using
A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System (JY, JK), pp. 763–768.
HCIHIMI-IIE-2007-AlsharaI #integration #learning #using
Business Integration Using the Interdisciplinary Project Based Learning Model (IPBL) (OKA, MI), pp. 823–833.
HCIHIMI-IIE-2007-DoyoSA #case study #transaction #using
A Study of Production / Transaction-Related Model Using Control Theory (DD, KS, KA), pp. 855–862.
HCIHIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social #using
Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HCIHIMI-IIE-2007-HarunN #user interface #using
User Interface for Knowledge Sharing Using Knowledge Gardening Metaphor (AFH, NLMN), pp. 319–327.
HCIHIMI-IIE-2007-HashimotoN #community #memory management #using
Fond Memory Management System by Using Information About Communities (KH, YN), pp. 23–29.
HCIHIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online #using
Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HCIHIMI-IIE-2007-IshiiYIN #navigation #using
A Navigation System Using Ultrasonic Directional Speaker with Rotating Base (KI, YY, MI, KN), pp. 526–535.
HCIHIMI-IIE-2007-KaminoyamaMHSKA #navigation #people #using
Walk Navigation System Using Photographs for People with Dementia (HK, TM, FH, KS, NK, SA), pp. 1039–1049.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-LiuYCL #estimation #health #modelling #using
Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
HCIHIMI-IIE-2007-MaILJ
Use of Chinese Short Messages (DM, FI, YL, LJ), pp. 582–591.
HCIHIMI-IIE-2007-NagamatsuKKS #development #eye tracking #using
Development of a Skill Acquisition Support System Using Expert’s Eye Movement (TN, YK, JK, HS), pp. 430–439.
HCIHIMI-IIE-2007-WakitaAT #metric #mobile #prototype #using
Methodology for Constructing a Prototype Site for Finding Employment SPI Measures Using Mobile Phones (SW, MA, TT), pp. 983–993.
HCIHIMI-IIE-2007-WangCH #memory management #using
Using Long Term Memory for Bookmark Management (MJW, KMC, TKH), pp. 812–820.
HCIHIMI-IIE-2007-YamaguchiNAHKN #artificial reality #named #navigation #using
AR-Navi: An In-Vehicle Navigation System Using Video-Based Augmented Reality Technology (YY, TN, KA, MH, HK, SN), pp. 1139–1147.
HCIHIMI-IIE-2007-YoonKPLY #game studies #modelling #using
Game Player Modeling Using D-FSMs (TBY, DMK, KHP, JHL, KHY), pp. 490–499.
HCIHIMI-MTT-2007-AblassmeierPRR #network #using
Context-Aware Information Agents for the Automotive Domain Using Bayesian Networks (MA, TP, SR, GR), pp. 561–570.
HCIHIMI-MTT-2007-ChienC #comprehension
The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch (YHC, CHC), pp. 814–823.
HCIHIMI-MTT-2007-ChoBKC #difference #on the #probability #using
On Achieving Proportional Loss Differentiation Using Dynamic-MQDDP with Differential Drop Probability (KC, SB, JK, JWC), pp. 584–593.
HCIHIMI-MTT-2007-CornsML #approach #development #machine learning #optimisation #using
Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
HCIHIMI-MTT-2007-GoncalvesaMJ #documentation #using
Using Autobiographic Information to Retrieve Real and Electronic Documents (DG, TJVG, RM, JAJ), pp. 427–436.
HCIHIMI-MTT-2007-Jeong #comprehension #using
Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HCIHIMI-MTT-2007-JiGC #comparison #using #word
Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HCIHIMI-MTT-2007-KwonSH #design #implementation #realtime #using
Design and Implementation of Enhanced Real Time News Service Using RSS and VoiceXML (HJK, JHS, KSH), pp. 677–686.
HCIHIMI-MTT-2007-LeeJ #case study #using
A Study on a Stereoscopic Display System Using a Rotary Disk Type Beam Shutter (KHL, TJJ), pp. 868–875.
HCIHIMI-MTT-2007-MarucciLC #approach #classification #fuzzy #using
Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
HCIHIMI-MTT-2007-Miki #collaboration #development #guidelines
Use of Socio-technical Guidelines in Collaborative System Development (HM), pp. 90–97.
HCIHIMI-MTT-2007-NagaiEK #comprehension #process #using
Measuring Brain Activities Related to Understanding Using Near-Infrared Spectroscopy (NIRS) (MN, NE, TK), pp. 884–893.
HCIHIMI-MTT-2007-SakuradaHON #interface #online #recognition #using
A Japanese Text Input Interface Using On-Line Writing-Box-Free Handwriting Recognition and Kana-to-Kanji Conversion (TS, YH, HO, MN), pp. 940–949.
HCIHIMI-MTT-2007-ShiIL #query #using #visual notation
Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
HCIHIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer #using
Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
HCIHIMI-MTT-2007-YonemuraYTO #analysis #communication #visual notation
Communication Analysis of Visual Support System That Uses Line Drawing Expression (SY, TY, YT, JO), pp. 359–365.
HCIOCSC-2007-BlevisLRS #design #interactive #research #using
Using Design Critique as Research to Link Sustainability and Interactive Technologies (EB, YKL, DR, ES), pp. 22–31.
HCIOCSC-2007-Dobson #design #towards
Toward Machine Therapy: Parapraxis of Machine Design and Use (KD), pp. 315–323.
HCIOCSC-2007-NuschkeJ #collaboration #communication #framework #information management #tool support #using
A Framework for Inter-organizational Collaboration Using Communication and Knowledge Management Tools (PN, XJ), pp. 406–415.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #using #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-HoltenCW #sequence #using #visualisation
Trace Visualization Using Hierarchical Edge Bundles and Massive Sequence Views (DH, BC, JJvW), pp. 47–54.
VISSOFTVISSOFT-2007-LangelierD #analysis #using #visual notation
Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
VISSOFTVISSOFT-2007-LienhardKG #agile #prototype #using #visualisation
Rapid Prototyping of Visualizations using Mondrian (AL, AK, OG), pp. 67–70.
AdaEuropeAdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling #using
Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, , FL), pp. 168–179.
AdaSIGAda-2007-Lau #imperative #reasoning #source code #using
Using SPARK for a beginner’s course on reasoning about imperative programs (KKL), pp. 75–78.
AdaSIGAda-2007-Maurer #ada #proving #using
Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
AdaSIGAda-2007-PukiteL #design #logic #simulation #using
Generic discrete event simulations using DEGAS: application to logic design and digital signal processing (PP, LL), pp. 27–40.
AdaSIGAda-2007-Singhoff #ada #named #realtime #scheduling
MP1: real time scheduling theory and its use with ada (FS), p. 8.
AdaSIGAda-2007-Sward #ada #architecture #named #using #web #web service
SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
AdaSIGAda-2007-Sward07a #ada #architecture #using
Using ada in a service-Ooriented architecture (RES), pp. 63–68.
CAiSECAiSE-2007-EderW #comparison #detection #graph #ontology #using
Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
CAiSECAiSE-2007-LiuBW #behaviour #modelling #using
Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
CAiSECAiSE-2007-SilvaAMC #design #social #using
Designing Social Patterns Using Advanced Separation of Concerns (CTLLS, JA, AMDM, JC), pp. 309–323.
EDOCEDOC-2007-LiningtonL #approach #behaviour #modelling #security #using
Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOCEDOC-2007-MilanovicKGGWDH #integration #process #using
Business Process Integration by Using General Rule Markup Language (MM, NK, DG, AG, GW, VD, MH), pp. 353–364.
EDOCEDOC-2007-Molina-JimenezSC #consistency #implementation #message passing #middleware #using
Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware (CMJ, SKS, NC), pp. 51–62.
EDOCEDOC-2007-RosenbergEMPD #aspect-oriented #development #process #quality #top-down #using
Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL (FR, CE, AM, CP, SD), pp. 15–26.
EDOCEDOC-2007-SunithaAK #using
Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
ICEISICEIS-AIDSS-2007-BermejoGP #email #using
Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
ICEISICEIS-AIDSS-2007-Constantine #enterprise #information management #process
Enterprise information systems for use: From business processes to human activity (LLC), pp. 33–38.
ICEISICEIS-AIDSS-2007-KirwanGM #adaptation #case study #energy #implementation #information management #using
Energy Management Information Systems: An Exploratory study of Implementations Using Adaptive Structuration Theory (OK, WG, PM), pp. 303–309.
ICEISICEIS-AIDSS-2007-KrohaR #classification #using
Using Grammars for Text Classification (PK, TR), pp. 259–264.
ICEISICEIS-AIDSS-2007-LiuCM #recognition #using
Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
ICEISICEIS-AIDSS-2007-YingboJJ #learning #predict #process #using #workflow
Using Decision Tree Learning to Predict Workflow Activity Time Consumption (YL, JW, JS), pp. 69–75.
ICEISICEIS-DISI-2007-AraqueSD #data flow #monitoring #using #web
Monitoring web data sources using temporal properties as an external resources of a data warehouse (FA, AS, CD), pp. 28–35.
ICEISICEIS-DISI-2007-CairesC #architecture #semantics #using #web
Using semantic web and service oriented technologies to build loosely coupled systems: SWOAT — a service and semantic web oriented architecture technology (BC, JC), pp. 226–232.
ICEISICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy #using
Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
ICEISICEIS-DISI-2007-Constantine #enterprise #information management #process
Enterprise information systems for use: From business processes to human activity (LLC), pp. 33–38.
ICEISICEIS-DISI-2007-GroppeGL #order #using
Using an index of precomputed joins in order to speed up SPARQL processing (SG, JG, VL), pp. 13–20.
ICEISICEIS-DISI-2007-PapatheocharousA #estimation #network #using
Software cost estimation using artificial neural networks with inputs selection (EP, ASA), pp. 398–407.
ICEISICEIS-DISI-2007-RaminhosP #approach #declarative #using
Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
ICEISICEIS-DISI-2007-RayG #using
A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEISICEIS-EIS-2007-AddinquyT #enterprise #requirements #specification #using
Reducing Requirements to EIS Specifications GAP Using RM-ODP Enterprise Viewpoint (CA, BT), pp. 31–38.
ICEISICEIS-EIS-2007-Constantine #enterprise #information management #process
Enterprise information systems for use: From business processes to human activity (LLC), pp. 33–38.
ICEISICEIS-EIS-2007-KarnouskosS #enterprise #network #towards #using
Towards Enterprise Applications Using Wireless Sensor Networks (SK, PS), pp. 230–236.
ICEISICEIS-EIS-2007-SomeN #case study #consistency #requirements #verification
Use Case Based Requirements Verification — Verifying the Consistency between Use Cases and Assertions (SSS, DKN), pp. 190–195.
ICEISICEIS-EIS-2007-ValenteS #case study #identification #process
Process Use Cases: Use Cases Identification (PV, PNMS), pp. 301–307.
ICEISICEIS-HCI-2007-AraujoB #architecture #education #game studies #using
Using Games in the Teaching of Digital Systems and of Computers Architecture (PJGdA, JVB), pp. 5–10.
ICEISICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech #using
Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
ICEISICEIS-HCI-2007-Constantine #enterprise #information management #process
Enterprise information systems for use: From business processes to human activity (LLC), pp. 33–38.
ICEISICEIS-HCI-2007-FariaBVR #framework #using
Platform to Drive an Intelligent Wheelchair Using Facial Expressions (PMF, RAMB, EV, LPR), pp. 164–169.
ICEISICEIS-HCI-2007-IshikawaYY #multi #novel #using
Novel View Telepresence with High-Scalability Using Multi-Casted Omni-Directional Videos (TI, KY, NY), pp. 148–156.
ICEISICEIS-J-2007-ArjunanWKNY #recognition #using
Recognition of Human Voice Utterances from Facial Surface EMG without Using Audio Signals (SPA, HW, DKK, GRN, WCY), pp. 366–378.
ICEISICEIS-J-2007-Barjis07a #modelling #process #simulation #using
A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
ICEISICEIS-J-2007-CastroO07a #distributed #multi #problem #using
Solving Airline Operations Problems Using Specialized Agents in a Distributed Multi-Agent System (AJMC, ECO), pp. 173–184.
ICEISICEIS-J-2007-TraversonA #requirements #specification #using
Linking Requirements to EIS Specifications Using Correspondence Rules (BT, CA), pp. 276–285.
ICEISICEIS-SAIC-2007-BoukadiGMB #petri net #specification #using #verification #web #web service
Specification and Verification of Views over Composite Web Services Using High Level Petri-Nets (KB, CG, ZM, DB), pp. 107–112.
ICEISICEIS-SAIC-2007-CheungSB #collaboration #using
Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
ICEISICEIS-SAIC-2007-Constantine #enterprise #information management #process
Enterprise information systems for use: From business processes to human activity (LLC), pp. 33–38.
ICEISICEIS-SAIC-2007-GarcesQCHC #e-commerce #modelling #multi #transaction #using
E-Commerce Transaction Modeling Using Moderately Open Multi-Agent Systems (AG, RQ, MC, JH, EC), pp. 167–172.
ICEISICEIS-SAIC-2007-Maximilien #approach #challenge #problem #ruby #semantics #using #web #web service
A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
ICEISICEIS-SAIC-2007-PoloniaCO #scalability
A MODEL to Optimize the Use of Imaging Equipment and Human Skills Scattered in Very Large Geographical Areas (DFP, CMAC, JLO), pp. 208–212.
ICEISICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics #using
Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
ICEISICEIS-SAIC-2007-RuizB #documentation #using
Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
ICEISICEIS-SAIC-2007-Silva #collaboration #using
Using Narratives in Collaborative Writing — An Example (NDS), pp. 351–358.
ICEISICEIS-SAIC-2007-WuGRSM #automation #composition #process #semantics #using #web #web service
Automatic Composition of Semantic Web Services Using Process Mediation (ZW, KG, AR, APS, JAM), pp. 453–462.
CIKMCIKM-2007-CarteretteA #documentation #evaluation #retrieval #using
Semiautomatic evaluation of retrieval systems using document similarities (BC, JA), pp. 873–876.
CIKMCIKM-2007-GuoCXW #maintenance #online #performance #using
Efficient on-line index maintenance for dynamic text collections by using dynamic balancing tree (RG, XC, HX, BW), pp. 751–760.
CIKMCIKM-2007-JurczykA #analysis #community #using
Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKMCIKM-2007-LadY #feedback #using
Generalizing from relevance feedback using named entity wildcards (AL, YY), pp. 721–730.
CIKMCIKM-2007-LiMGDBM #predict #process #using
Predicting individual priorities of shared activities using support vector machines (LL, MJM, WG, CD, BB, DRM), pp. 515–524.
CIKMCIKM-2007-Pasca07a #query #using #web
Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
CIKMCIKM-2007-PeraN #email #similarity #using #word
Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
CIKMCIKM-2007-WangFZ #feedback #query #retrieval #using
Improve retrieval accuracy for difficult queries using negative feedback (XW, HF, CZ), pp. 991–994.
CIKMCIKM-2007-XuBCY #information retrieval #social #using
Using social annotations to improve language model for information retrieval (SX, SB, YC, YY), pp. 1003–1006.
CIKMCIKM-2007-YangQZGL #analysis #graph #using #web
Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKMCIKM-2007-YanH #feedback #multi #probability #query #retrieval #using
Query expansion using probabilistic local feedback with application to multimedia retrieval (RY, AGH), pp. 361–370.
CIKMCIKM-2007-YuTT #category theory #evaluation #ontology #using #wiki
Ontology evaluation using wikipedia categories for browsing (JY, JAT, AMT), pp. 223–232.
ECIRECIR-2007-AshooriL #repository #topic #using #xml
Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
ECIRECIR-2007-AslamP #estimation #multi #query #using
Query Hardness Estimation Using Jensen-Shannon Divergence Among Multiple Scoring Functions (JAA, VP), pp. 198–209.
ECIRECIR-2007-BrunnertAR #enterprise #people #retrieval #using #visualisation
Enterprise People and Skill Discovery Using Tolerant Retrieval and Visualization (JB, OA, DR), pp. 674–677.
ECIRECIR-2007-HeD #classification #naive bayes #using
Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIRECIR-2007-MacdonaldO #feedback #using
Using Relevance Feedback in Expert Search (CM, IO), pp. 431–443.
ECIRECIR-2007-MartinetS #documentation #using
Using Visual-Textual Mutual Information and Entropy for Inter-modal Document Indexing (JM, SS), pp. 549–556.
ECIRECIR-2007-Medina-PagolaRHP #distance #documentation #representation #using
Document Representation Using Global Association Distance Model (JEMP, AYRG, AHD, JHP), pp. 565–572.
ECIRECIR-2007-MeenaP #analysis #sentiment #using
Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ECIRECIR-2007-MeloS #classification #multi #ontology #using
Multilingual Text Classification Using Ontologies (GdM, SS), pp. 541–548.
ECIRECIR-2007-MoreauCS #automation #machine learning #query #using
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning (FM, VC, PS), pp. 222–233.
ECIRECIR-2007-PaltoglouSS #algorithm #modelling #multi #using
Results Merging Algorithm Using Multiple Regression Models (GP, MS, MS), pp. 173–184.
ECIRECIR-2007-RoullandKCRGPO #clustering #query #refinement #using
Query Reformulation and Refinement Using NLP-Based Sentence Clustering (FR, ANK, SC, CR, AG, KP, JO), pp. 210–221.
ECIRECIR-2007-ShahE #detection #documentation #metric #representation #topic
Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
ECIRECIR-2007-YamoutOT #feedback #query #using
Relevance Feedback Using Weight Propagation Compared with Information-Theoretic Query Expansion (FY, MPO, JT), pp. 258–270.
ECIRECIR-2007-YuSLWM #image #ranking #using
Improve Ranking by Using Image Information (QY, SS, ZL, JRW, WYM), pp. 645–652.
ECIRECIR-2007-ZhangZC #performance #scalability #using
Efficient Construction of FM-index Using Overlapping Block Processing for Large Scale Texts (DZ, YZ, JC), pp. 113–123.
ECIRECIR-2007-ZwolL #effectiveness #retrieval #semantics #xml
Effective Use of Semantic Structure in XML Retrieval (RvZ, TvL), pp. 621–628.
ICMLICML-2007-DingL #adaptation #analysis #clustering #reduction #using
Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICMLICML-2007-GerberTW #reduction #robust #using
Robust non-linear dimensionality reduction using successive 1-dimensional Laplacian Eigenmaps (SG, TT, RTW), pp. 281–288.
ICMLICML-2007-LeskovecF #graph #modelling #multi #scalability #using
Scalable modeling of real graphs using Kronecker multiplication (JL, CF), pp. 497–504.
ICMLICML-2007-Mahadevan #3d #adaptation #learning #multi #using
Adaptive mesh compression in 3D computer graphics using multiscale manifold learning (SM), pp. 585–592.
ICMLICML-2007-NilssonSJ #kernel #reduction #using
Regression on manifolds using kernel dimension reduction (JN, FS, MIJ), pp. 697–704.
ICMLICML-2007-WipfN #using
Beamforming using the relevance vector machine (DPW, SSN), pp. 1023–1030.
KDDKDD-2007-BeckerA #concept #ranking #realtime #using
Real-time ranking with concept drift using expert advice (HB, MA), pp. 86–94.
KDDKDD-2007-ChewBKA #information retrieval #using
Cross-language information retrieval using PARAFAC2 (PAC, BWB, TGK, AA), pp. 143–152.
KDDKDD-2007-CulottaWHMM #adaptation #database #metric #similarity #using
Canonicalization of database records using adaptive similarity measures (AC, MLW, RH, MM, AM), pp. 201–209.
KDDKDD-2007-DingSJL #framework #kernel #learning #recommendation #using
A learning framework using Green’s function and kernel regularization with application to recommender system (CHQD, RJ, TL, HDS), pp. 260–269.
KDDKDD-2007-SatoN #documentation #information management #multi #parametricity #topic #using
Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior (IS, HN), pp. 590–598.
KDDKDD-2007-Schickel-ZuberF #clustering #learning #recommendation #using
Using hierarchical clustering for learning theontologies used in recommendation systems (VSZ, BF), pp. 599–608.
KDDKDD-2007-SrihariXS #documentation #generative
Use of ranked cross document evidence trails for hypothesis generation (RKS, LX, TS), pp. 677–686.
MLDMMLDM-2007-GomezF #2d #algorithm #evolution #hybrid #image #learning
A Hybrid Algorithm Based on Evolution Strategies and Instance-Based Learning, Used in Two-Dimensional Fitting of Brightness Profiles in Galaxy Images (JCG, OF), pp. 716–726.
MLDMMLDM-2007-HanKK #performance #sequence #using
Efficient Subsequence Matching Using the Longest Common Subsequence with a Dual Match Index (TSH, SKK, JK), pp. 585–600.
MLDMMLDM-2007-MartinsSSPG #classification #image #using
Classification of Breast Masses in Mammogram Images Using Ripley’s K Function and Support Vector Machine (LdOM, ECdS, ACS, ACdP, MG), pp. 784–794.
MLDMMLDM-2007-PracnerTRI #categorisation #evaluation #using
Categorizing Evolved CoreWar Warriors Using EM and Attribute Evaluation (DP, NT, MR, MI), pp. 681–693.
MLDMMLDM-2007-SunV #using
Data Selection Using SASH Trees for Support Vector Machines (CS, RV), pp. 286–295.
MLDMMLDM-2007-ZagorisPK #algorithm #fuzzy #reduction #self #using
Color Reduction Using the Combination of the Kohonen Self-Organized Feature Map and the Gustafson-Kessel Fuzzy Algorithm (KZ, NP, IK), pp. 703–715.
RecSysRecSys-2007-LathiaHC #collaboration #distributed #metric #using
Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
RecSysRecSys-2007-NathansonBG #adaptation #clustering #recommendation #using
Eigentaste 5.0: constant-time adaptability in a recommender system using item clustering (TN, EB, KYG), pp. 149–152.
SEKESEKE-2007-AmouiST #network #predict #using
Temporal Software Change Prediction Using Neural Networks (MA, MS, LT), pp. 380–385.
SEKESEKE-2007-GuzmanPP #modelling #pattern matching #using
Using Model-Driven Pattern Matching to derive functionalities in Models (IGRdG, MP, MP), pp. 529–534.
SEKESEKE-2007-HofmeisterW #architecture #design #independence #using
Designing a Platform-Independent Use-Case for a Composite Application using a Reference Architecture (HH, GW), pp. 227–231.
SEKESEKE-2007-HuangL07a #composition #reasoning #using
Service Composition Using Planning and Case-Based Reasoning (KHH, AL), pp. 610–615.
SEKESEKE-2007-KanaskarSR #analysis #approach #detection #using
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-KrenickyWE #design #query #using
Exploratory Design of Derivation Business Rules Using Query Rewriting (RK, DW, SME), pp. 467–472.
SEKESEKE-2007-LimCR #automation #case study #diagrams #documentation #generative #specification
Automatic Generation of Use Case Diagrams from English Specifications Document (NRTL, CTC, JAER), pp. 203–208.
SEKESEKE-2007-MizouniSD #case study #composition #requirements #using
Using Formal Composition of Use Cases in Requirements Engineering (RM, AS, RD), p. 238–?.
SEKESEKE-2007-MonteiroOG #implementation #source code #user interface #using
A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKESEKE-2007-MoserPS #agile #development #incremental #modelling #predict #using
Incremental Effort Prediction Models in Agile Development using Radial Basis Functions (RM, WP, GS), pp. 519–522.
SEKESEKE-2007-OliveiraAB #information management #maintenance
Telling Stories about System Use: Capturing Collective Tacit Knowledge for System Maintenance (ACdO, RMdA, MRSB), pp. 337–342.
SEKESEKE-2007-Rhem #modelling #uml #using
Knowledge Modelling using UML (AJR), p. 755–?.
SEKESEKE-2007-SettasS #ontology #project management #using
Using Ontologies to Represent Software Project Management Antipatterns (DS, IS), pp. 604–609.
SEKESEKE-2007-TranCT #modelling #process
Broadening the Use of Process Patterns for Modeling Processes (HNT, BC, DTBT), pp. 57–62.
SEKESEKE-2007-WongZQCD #effectiveness #fault #locality #network #using
Effective Fault Localization using BP Neural Networks (WEW, LZ, YQ, KYC, JD), pp. 374–379.
SIGIRSIGIR-2007-AlonsoGB #timeline #using #visualisation
Search results using timeline visualizations (OA, MG, RABY), p. 908.
SIGIRSIGIR-2007-AzzopardiRB #analysis #query #topic #using
Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIRSIGIR-2007-BaiNCB #information retrieval #query #using
Using query contexts in information retrieval (JB, JYN, GC, HB), pp. 15–22.
SIGIRSIGIR-2007-BanerjeeRG #clustering #using #wiki
Clustering short texts using wikipedia (SB, KR, AG), pp. 787–788.
SIGIRSIGIR-2007-BroderFGJJZ #classification #query #robust #using #web
Robust classification of rare queries using web knowledge (AZB, MF, EG, AJ, VJ, TZ), pp. 231–238.
SIGIRSIGIR-2007-CastilloDGMS #detection #using #web
Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
SIGIRSIGIR-2007-Collins-ThompsonC #estimation #feedback #nondeterminism #pseudo
Estimation and use of uncertainty in pseudo-relevance feedback (KCT, JC), pp. 303–310.
SIGIRSIGIR-2007-Diaz #performance #predict #using
Performance prediction using spatial autocorrelation (FD), pp. 583–590.
SIGIRSIGIR-2007-FernandezL #analysis #detection #using
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-FranzX #multi #segmentation #using
Story segmentation of broadcast news in Arabic, Chinese and English using multi-window features (MF, JMX), pp. 703–704.
SIGIRSIGIR-2007-FuKS #collaboration #query #retrieval #topic #using
Using collaborative queries to improve retrieval for difficult topics (XF, DK, CS), pp. 879–880.
SIGIRSIGIR-2007-GaoNNZHWH #query #using
Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIRSIGIR-2007-KyriakopoulouK #classification #clustering #using
Using clustering to enhance text classification (AK, TK), pp. 805–806.
SIGIRSIGIR-2007-LiLHC #ad hoc #corpus #query #using #wiki
Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
SIGIRSIGIR-2007-LiuHAY #named #performance #predict #sentiment #using
ARSA: a sentiment-aware model for predicting sales performance using blogs (YL, XH, AA, XY), pp. 607–614.
SIGIRSIGIR-2007-Metzler #modelling #parametricity #using
Using gradient descent to optimize language modeling smoothing parameters (DM), pp. 687–688.
SIGIRSIGIR-2007-MetzlerC #concept #markov #random #using
Latent concept expansion using markov random fields (DM, WBC), pp. 311–318.
SIGIRSIGIR-2007-QiuLBCK #ambiguity #metadata #query #using
Quantify query ambiguity using ODP metadata (GQ, KL, JB, CC, ZK), pp. 697–698.
SIGIRSIGIR-2007-SitbonB #segmentation #topic #using
Topic segmentation using weighted lexical links (WLL) (LS, PB), pp. 737–738.
SIGIRSIGIR-2007-SmuckerA #similarity #using #web
Using similarity links as shortcuts to relevant web pages (MDS, JA), pp. 863–864.
SIGIRSIGIR-2007-TurnbullBTL #semantics #set #towards #using
Towards musical query-by-semantic-description using the CAL500 data set (DT, LB, DAT, GRGL), pp. 439–446.
SIGIRSIGIR-2007-Wan #clustering #documentation #evaluation #named #using
OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
SIGIRSIGIR-2007-WhiteBC #interactive #web
Studying the use of popular destinations to enhance web search interaction (RWW, MB, SC), pp. 159–166.
SIGIRSIGIR-2007-ZhangHRJ #learning #query #using
Query rewriting using active learning for sponsored search (WVZ, XH, BR, RJ), pp. 853–854.
SIGIRSIGIR-2007-ZhengCSZ #framework #learning #ranking #using
A regression framework for learning ranking functions using relative relevance judgments (ZZ, KC, GS, HZ), pp. 287–294.
SIGIRSIGIR-2007-ZhuYCG #classification #matrix #using
Combining content and link for classification using matrix factorization (SZ, KY, YC, YG), pp. 487–494.
ECMFAECMDA-FA-2007-Warmer #domain-specific language #modelling #using
A Model Driven Software Factory Using Domain Specific Languages (JW), pp. 194–203.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml #using
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
MODELSMoDELS-2007-SmialekBNAS #case study
Complementary Use Case Scenario Representations Based on Domain Vocabularies (MS, JB, WN, AA, TS), pp. 544–558.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml #using
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
MODELSMoDELS-2007-SmialekBNAS #case study
Complementary Use Case Scenario Representations Based on Domain Vocabularies (MS, JB, WN, AA, TS), pp. 544–558.
ECOOPECOOP-2007-BalzerGE #reasoning #relational
A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships (SB, TRG, PE), pp. 323–346.
ECOOPECOOP-2007-DoorenS #abstraction #inheritance #using
A Higher Abstraction Level Using First-Class Inheritance Relations (MvD, ES), pp. 425–449.
ECOOPECOOP-2007-VaziriTFD #declarative #using
Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
OOPSLAOOPSLA-2007-BuytaertGHAEB #compilation #using
Using hpm-sampling to drive dynamic compilation (DB, AG, MH, MA, LE, KDB), pp. 553–568.
OOPSLAOOPSLA-2007-Meijer #programming language
Confessions of a used programming language salesman (EM), pp. 677–694.
OOPSLAOOPSLA-2007-Rinard #termination #using
Using early phase termination to eliminate load imbalances at barrier synchronization points (MCR), pp. 369–386.
GPCEGPCE-2007-JarviMS #adaptation #c++ #composition #concept #library #using
Library composition and adaptation using c++ concepts (JJ, MAM, JNS), pp. 73–82.
LOPSTRLOPSTR-2007-ZhangN #constraints #scalability #theorem proving #unification #using
A Scalable Inclusion Constraint Solver Using Unification (YZ, FN), pp. 121–137.
PPDPPPDP-2007-Lucas #proving #termination
Practical use of polynomials over the reals in proofs of termination (SL), pp. 39–50.
PPDPPPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis #using
Detecting defects in Erlang programs using static analysis (KFS), p. 37.
QAPLQAPL-2007-BistarelliMRS #constraints #graph #logic programming #modelling #multi #using
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming (SB, UM, FR, FS), pp. 111–127.
QAPLQAPL-2007-YaikhomCGH #approach #modelling #performance #using
A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
PADLPADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #using #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADLPADL-2007-FisselerKBKM #algebra #haskell #information management #using
Algebraic Knowledge Discovery Using Haskell (JF, GKI, CB, AK, CM), pp. 80–93.
PADLPADL-2007-HuangHP #named #parallel #process #using
HPorter: Using Arrows to Compose Parallel Processes (LH, PH, JP), pp. 275–289.
POPLPOPL-2007-ShenSMD #approximate #locality #using
Locality approximation using time (XS, JS, BM, CD), pp. 55–61.
RERE-2007-BhatG #maintenance #using
Enhancing Requirement Stakeholder Satisfaction during Far-shore Maintenance of Custom Developed Software using Shift-Pattern Model (JMB, MG), pp. 322–327.
RERE-2007-ConejeroHMA #requirements #using
Discovering Volatile and Aspectual Requirements Using a Crosscutting Pattern (JMC, JH, AMDM, JA), pp. 391–392.
RERE-2007-Fricker #network #social #using
Explaining Stakeholder Negotiation Using Social Goal Networks (SF), pp. 387–388.
RERE-2007-KartsevaGT #design #enterprise #using
Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
RERE-2007-MaidenLRJB #modelling #using
Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System (NAMM, JL, DR, SJ, DB), pp. 49–52.
RERE-2007-MaidenNKSG #requirements
Exploring Scenario Forms and Ways of Use to Discover Requirements on Airports that Minimize Environmental Impact (NAMM, CN, SK, NS, PG), pp. 29–38.
RERE-2007-MunirajJ #prototype #requirements #using
Requirements Engineering using Prototyping Projects in Healthcare Diagnostic Software Applications (GM, VJ), pp. 307–312.
RERE-2007-SmithG #game studies #lightweight #requirements #using
Using a Game to Introduce Lightweight Requirements Engineering (RS, OG), pp. 379–380.
REFSQREFSQ-2007-AlkkiomakiS #architecture #case study #functional #integration #modelling #requirements #uml
Integration Use Cases — An Applied UML Technique for Modeling Functional Requirements in Service Oriented Architecture (VA, KS), pp. 190–202.
REFSQREFSQ-2007-FrickerGM #implementation #using
Handshaking Between Software Projects and Stakeholders Using Implementation Proposals (SF, TG, PM), pp. 144–159.
SACSAC-OOPS-J-2006-Steimann07 #interface #programming #refactoring
The Infer Type Refactoring and its Use for Interface-Based Programming (FS), pp. 99–120.
SACSAC-2007-AhamedHSK #pervasive #using
Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
SACSAC-2007-Avila-GarciaER #modelling #product line #using
Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
SACSAC-2007-BistarelliFP #using
Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
SACSAC-2007-BoussellaaZA #hybrid #using
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SACSAC-2007-BraghettoFP #control flow #process #specification #using
Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
SACSAC-2007-CambroneroPDV #modelling #using #web #web service
Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
SACSAC-2007-Cardoso-CachopoO #categorisation #classification #using
Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
SACSAC-2007-ChenL #hardware
Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
SACSAC-2007-Chiong #algorithm #search-based #using
Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
SACSAC-2007-CimadamoreV #approach #java #using
Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
SACSAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification #using
Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
SACSAC-2007-FabroV #automation #integration #modelling #using #weaving
Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
SACSAC-2007-FangWLYD #assessment #detection #multi #sequence #using
The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
SACSAC-2007-GooneratneTH #algorithm #graph #traversal #using #verification #web #web service
Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
SACSAC-2007-HuXP #approach #modelling #using
Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
SACSAC-2007-KawsarFN #lightweight #using
A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
SACSAC-2007-Kofron #behaviour #component #protocol #using
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-LebbahMR #constraints #implementation #performance #reduction #using
Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
SACSAC-2007-LeeHPLJK #performance #regular expression #using
A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
SACSAC-2007-LoukidesS #privacy
Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
SACSAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation #using
Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
SACSAC-2007-NollR #ontology #traceability #using
Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
SACSAC-2007-NoordendeBT #mobile #security #using
Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
SACSAC-2007-OHareGJLOS #using
Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
SACSAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #using #verification
Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
SACSAC-2007-PaliwalAB #distributed #using #verification #web #web service
Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
SACSAC-2007-PaulK #precise #slicing #using
Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
SACSAC-2007-PereraGB #low level #using #visualisation
Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
SACSAC-2007-PlattGM #detection #on the #query #sequence #topic #using
On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
SACSAC-2007-PolatD #privacy #using
Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
SACSAC-2007-SarfrazR #algorithm #image #polynomial #random #using
A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
SACSAC-2007-TanC #classification #using
Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
SACSAC-2007-TetsuyaAHN #ad hoc #generative #network #using
Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SACSAC-2007-VarroB #automation #induction #logic programming #model transformation #using
Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
SACSAC-2007-VuMTA #knowledge base #using #web
Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
SACSAC-2007-XingXE #approximate #automation #documentation #using #xml
Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
SACSAC-2007-XiongCL #classification #database #mining #multi #using
Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
SACSAC-2007-YiYC #mobile #multi #using
Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
SACSAC-2007-ZhangMMB #locality #network #performance #problem #self #using
Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
SACSAC-2007-ZhouHP #database #image #using
An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
ESEC-FSEESEC-FSE-2007-Coman #analysis #automation #developer #low level #using
An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSEESEC-FSE-2007-GrechanikMP #traceability #using
Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSEESEC-FSE-2007-HalfondO #automation #generative #interface #testing #using #web
Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
ESEC-FSEESEC-FSE-2007-MajumdarX #generative #testing #using
Directed test generation using symbolic grammars (RM, RGX), pp. 553–556.
ESEC-FSEESEC-FSE-2007-PatelBS #capacity #case study #using
A case study in assessing and improving capacity using an anatomy of good practice (MP, AB, KS), pp. 509–512.
ESEC-FSEESEC-FSE-2007-SankaranarayananCJI #constraints #feedback #generative #monte carlo #using
State space exploration using feedback constraint generation and Monte-Carlo sampling (SS, RMC, GJ, FI), pp. 321–330.
ESEC-FSEESEC-FSE-2007-SherriffHLW #identification #static analysis #using
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ESEC-FSEESEC-FSE-2007-XuRTQ #java #performance #using
Efficient checkpointing of java software using context-sensitive capture and replay (G(X, AR, YT, FQ), pp. 85–94.
ESEC-FSEESEC-FSE-2007-ZibinPAAKE #java #using
Object and reference immutability using java generics (YZ, AP, MA, SA, AK, MDE), pp. 75–84.
GTTSEGTTSE-2007-SeguraBCT #automation #feature model #graph transformation #modelling #using
Automated Merging of Feature Models Using Graph Transformations (SS, DB, ARC, PT), pp. 489–505.
ICSEICSE-2007-BernerWK #test coverage #testing
Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSEICSE-2007-BestJN #distributed #information management #modelling #security #using
Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #using #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSEICSE-2007-RajapakseJ #analysis #trade-off #using #web
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSEICSE-2007-RunesonAN #detection #fault #natural language #using
Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
ICSEICSE-2007-Staron #education #evaluation #learning #process #re-engineering #student #using
Using Experiments in Software Engineering as an Auxiliary Tool for Teaching — A Qualitative Evaluation from the Perspective of Students’ Learning Process (MS), pp. 673–676.
ICSEICSE-2007-YuanM #feedback #runtime #testing #user interface #using
Using GUI Run-Time State as Feedback to Generate Test Cases (XY, AMM), pp. 396–405.
ICSEICSE-2007-Zualkernan #learning #programming #using
Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes (IAZ), pp. 723–726.
SPLCSPLC-2007-BeucheBDFGHJJKMW #product line #requirements #tool support #using
Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice (DB, AB, HD, AF, HG, GH, DJ, IJ, RTK, TvdM, AW), pp. 84–96.
SPLCSPLC-2007-BragancaM #automation #case study #diagrams #feature model #modelling #product line
Automating Mappings between Use Case Diagrams and Feature Models for Software Product Lines (AB, RJM), pp. 3–12.
SPLCSPLC-2007-KastnerAB #aspectj #case study #implementation #using
A Case Study Implementing Features Using AspectJ (CK, SA, DSB), pp. 223–232.
SPLCSPLC-2007-VolterG #aspect-oriented #development #implementation #modelling #product line #using
Product Line Implementation using Aspect-Oriented and Model-Driven Software Development (MV, IG), pp. 233–242.
CCCC-2007-JeonSH #data access #layout #using
Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
CCCC-2007-LeeRBM #constraints #control flow #graph #using
Correcting the Dynamic Call Graph Using Control-Flow Constraints (BL, KR, MDB, KSM), pp. 80–95.
CCCC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling #using
Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CCCC-2007-PazP #garbage collection #using
Using Prefetching to Improve Reference-Counting Garbage Collectors (HP, EP), pp. 48–63.
CCCC-2007-ScholzB #analysis #composition #data flow #framework #using
A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGOCGO-2007-BarthouDCDJ #compilation #composition #kernel #optimisation #using
Loop Optimization using Hierarchical Compilation and Kernel Decomposition (DB, SD, PC, AD, WJ), pp. 170–184.
CGOCGO-2007-CavazosFABOT #compilation #optimisation #performance #using
Rapidly Selecting Good Compiler Optimizations using Performance Counters (JC, GF, FVA, EVB, MFPO, OT), pp. 185–197.
CGOCGO-2007-DaiLH #execution #network #pipes and filters #using
Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
CGOCGO-2007-GrzegorczykSKW #feedback #using
Isla Vista Heap Sizing: Using Feedback to Avoid Paging (CG, SS, CK, RW), pp. 325–340.
COCVCOCV-2007-FangS #bidirectional #compilation #generative #java #using
Generating Java Compiler Optimizers Using Bidirectional CTL (LF, MS), pp. 49–63.
HPCAHPCA-2007-ClarkHYMF #hardware #lightweight #using
Liquid SIMD: Abstracting SIMD Hardware using Lightweight Dynamic Mapping (NC, AH, SY, SAM, KF), pp. 216–227.
HPDCHPDC-2007-HackerM #queue #reliability #using
Using queue structures to improve job reliability (TJH, ZM), pp. 43–54.
HPDCHPDC-2007-KimKMBS #network #using
Using content-addressable networks for load balancing in desktop grids (JSK, PJK, MAM, BB, AS), pp. 189–198.
HPDCHPDC-2007-MullerGSF #case study #game studies #multi #online #replication #scalability #using
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2 (JM, SG, TS, SF), pp. 219–220.
ISMMISMM-2007-KeroNL #garbage collection #incremental
A correct and useful incremental copying garbage collector (MK, JN, PL), pp. 129–140.
ISMMISMM-2007-NguyenR #detection #memory management #using
Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
LCTESLCTES-2007-AbouGhazalehFRXLCMM #cpu #machine learning #scalability #using
Integrated CPU and l2 cache voltage scaling using machine learning (NA, APF, CR, RX, FL, BRC, DM, RGM), pp. 41–50.
LCTESLCTES-2007-HinesTW #using
Addressing instruction fetch bottlenecks by using an instruction register file (SRH, GST, DBW), pp. 165–174.
PPoPPPPoPP-2007-GontmakherMS #energy #multi #performance #thread #using
Using fine grain multithreading for energy efficient computing (AG, AM, AS), pp. 259–269.
PPoPPPPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread #using
Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
PPoPPPPoPP-2007-MamidalaNVSP #on the #performance #scalability #trade-off #using
On using connection-oriented vs. connection-less transport for performance and scalability of collective and one-sided operations: trade-offs and impact (ARM, SN, AV, GS, DKP), pp. 46–54.
SOSPSOSP-2007-RossbachHPRAW #hardware #memory management #named #operating system #transaction #using
TxLinux: using and managing hardware transactional memory in an operating system (CJR, OSH, DEP, HER, BA, EW), pp. 87–102.
SOSPSOSP-2007-VandiverBLM #commit #fault #scheduling #transaction #using
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling (BV, HB, BL, SM), pp. 59–72.
AMOSTAMOST-2007-ChenPU #analysis #dependence #generative #modelling #testing #using
Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
AMOSTAMOST-2007-FraserW #generative #ltl #model checking #performance #testing #using
Using LTL rewriting to improve the performance of model-checker based test-case generation (GF, FW), pp. 64–74.
CADECADE-2007-GeBT #modulo theories #quantifier #satisfiability #using #verification
Solving Quantified Verification Conditions Using Satisfiability Modulo Theories (YG, CB, CT), pp. 167–182.
CADECADE-2007-Harrison #automation #proving #using
Automating Elementary Number-Theoretic Proofs Using Gröbner Bases (JH), pp. 51–66.
CADECADE-2007-KoprowskiM #dependence #predict #satisfiability #using
Predictive Labeling with Dependency Pairs Using SAT (AK, AM), pp. 410–425.
CADECADE-2007-MotikSH #logic #reasoning #using
Optimized Reasoning in Description Logics Using Hypertableaux (BM, RS, IH), pp. 67–83.
CADECADE-2007-TiwariG #logic #program analysis #proving #theorem proving #using
Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
CAVCAV-2007-SinhaC #composition #lazy evaluation #learning #satisfiability #using #verification
SAT-Based Compositional Verification Using Lazy Learning (NS, EMC), pp. 39–54.
CAVCAV-2007-WangYGI #precise #reachability #using
Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra (CW, ZY, AG, FI), pp. 352–365.
ICLPICLP-2007-NieuwenborghCV #fuzzy #set #using
Computing Fuzzy Answer Sets Using dlvhex (DVN, MDC, DV), pp. 449–450.
ICLPICLP-2007-West #animation #logic programming #programming language #specification
The Use of a Logic Programming Language in the Animation of Z Specifications (MMW), pp. 451–452.
ISSTAISSTA-2007-Koster #consistency #quality #using
Using portfolio theory for better and more consistent quality (KK), pp. 108–117.
ISSTAISSTA-2007-NainarCRL #debugging #statistics #using
Statistical debugging using compound boolean predicates (PAN, TC, JR, BL), pp. 5–15.
ISSTAISSTA-2007-ShohamYFP #abstraction #mining #specification #using
Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
MBTMBT-2007-DadeauLB #java #ml #specification #testing #using
Measuring a Java Test Suite Coverage Using JML Specifications (FD, YL, LdB), pp. 21–32.
MBTMBT-2007-OuimetL #automation #consistency #satisfiability #specification #state machine #using #verification
Automated Verification of Completeness and Consistency of Abstract State Machine Specifications using a SAT Solver (MO, KL), pp. 85–97.
RTARTA-2007-EscobarM #infinity #model checking #using
Symbolic Model Checking of Infinite-State Systems Using Narrowing (SE, JM), pp. 153–168.
RTARTA-2007-KorpM #bound #proving #term rewriting #termination #using
Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
ICSTSAT-2007-DeKV #using
Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
TAPTAP-2007-Gargantini #detection #fault #model checking #testing #using
Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
TAPTAP-2007-LiuMS #automation #contract #generative #quality #query #testing #using
Using Contracts and Boolean Queries to Improve the Quality of Automatic Test Generation (L(L, BM, BS), pp. 114–130.
TAPTAP-2007-RummerS #calculus #java #logic #proving #source code #using
Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
VMCAIVMCAI-2007-BouillaguetKWZR #data type #first-order #proving #theorem proving #using #verification
Using First-Order Theorem Provers in the Jahob Data Structure Verification System (CB, VK, TW, KZ, MCR), pp. 74–88.
CBSECBSE-2006-CangussuCW #component #multi #process #using
Multi Criteria Selection of Components Using the Analytic Hierarchy Process (JWC, KMLC, WEW), pp. 67–81.
CBSECBSE-2006-CervantesC #architecture #lightweight #product line #using #workflow
Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture (HC, SCV), pp. 198–205.
ASEASE-2006-Antkiewicz #modelling #using
Round-Trip Engineering of Framework-Based Software using Framework-Specific Modeling Languages (MA), pp. 323–326.
ASEASE-2006-FalbRA #automation #design #interactive #specification #synthesis #user interface #using
Using communicative acts in interaction design specifications for automated synthesis of user interfaces (JF, TR, EA), pp. 261–264.
ASEASE-2006-HassanZ #certification #predict #using
Using Decision Trees to Predict the Certification Result of a Build (AEH, KZ), pp. 189–198.
ASEASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
ASEASE-2006-LiuYR #library #model checking #using
Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
ASEASE-2006-RobbyDH #framework #model checking #using
Domain-specific Model Checking Using The Bogor Framework (R, MBD, JH), pp. 369–370.
CASECASE-2006-ChaoSZJM #analysis #automation #information management #using
Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASECASE-2006-GuoLX #modelling #on the #petri net #using
On Modeling a Soccer Robot System Using Petri Nets (BG, ZL, SX), pp. 460–465.
CASECASE-2006-HuSHL #modelling #probability #using
Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASECASE-2006-KwokHLF #image #multi #optimisation #using
Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
CASECASE-2006-KwokLWY #framework #replication #using
Evolutionary Replication of Calligraphic Characters By A Robot Drawing Platform Using Experimentally Acquired Brush Footprint (KWK, KWL, SMW, YY), pp. 466–471.
CASECASE-2006-LamiriX #using
Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
CASECASE-2006-LiLWC #automation #component #equation #generative #graph #linear #using
Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASECASE-2006-LopatinY #algorithm #approximate #polynomial #using
Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator’s control in an unknown environment (PKL, ASY), pp. 206–211.
CASECASE-2006-RaghavanV #optimisation #parallel #product line #scheduling #using
Scheduling Parallel Batch Processors with Incompatible Job Families Using Ant Colony Optimization (NRSR, MV), pp. 507–512.
CASECASE-2006-SchiffG #automation #network #using
Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
CASECASE-2006-ShaoHM #algorithm #analysis #component #linear #multi #using
Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASECASE-2006-XuLT #using #visual notation
Visual Positioning Using Four-Point Planar Patterns (DX, YL, MT), pp. 600–605.
CASECASE-2006-XuWZZ #algorithm #automation #detection #using
An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
CASECASE-2006-YoungSB #implementation #interactive
Implementing Bubblegrams: The Use of Haar-Like Features for Human-Robot Interaction (JEY, ES, JEB), pp. 298–303.
DACDAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis #using
Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
DACDAC-2006-BrahmbhattZWQ #adaptation #algorithm #encoding #hybrid #power management #using
Low-power bus encoding using an adaptive hybrid algorithm (ARB, JZ, QW, QQ), pp. 987–990.
DACDAC-2006-BrierM #architecture #c #c++ #modelling #verification
Use of C/C++ models for architecture exploration and verification of DSPs (DB, RSM), pp. 79–84.
DACDAC-2006-ChaoCWCW #analysis #using
Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DACDAC-2006-FatemiNP #analysis #logic #statistics #using
Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DACDAC-2006-GoffioulVDDC #consistency #design #object-oriented #using
Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
DACDAC-2006-GopalakrishnanLP #architecture #metric #using
Architecture-aware FPGA placement using metric embedding (PG, XL, LTP), pp. 460–465.
DACDAC-2006-GuthausSB #programming #using
Clock buffer and wire sizing using sequential programming (MRG, DS, RBB), pp. 1041–1046.
DACDAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics #using
Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DACDAC-2006-TanimotoYNH #realtime #using
A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DACDAC-2006-WangGDK #design #optimisation #using
Design space exploration using time and resource duality with the ant colony optimization (GW, WG, BD, RK), pp. 451–454.
DACDAC-2006-YuhYC #using
Placement of digital microfluidic biochips using the t-tree formulation (PHY, CLY, YWC), pp. 931–934.
DACDAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry #using
Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
DACDAC-2006-ZhaoPSYF #algorithm #linear #megamodelling #performance #programming #using
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming (MZ, RP, SS, SY, YF), pp. 217–222.
DATEDATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis #using
Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATEDATE-2006-AhmedM #design #performance #uml #using
Faster exploration of high level design alternatives using UML for better partitions (WA, DM), pp. 579–580.
DATEDATE-2006-Al-JunaidK #modelling #using
HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope (HAJ, TJK), pp. 644–645.
DATEDATE-2006-AmelifardFP #using
Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
DATEDATE-2006-BanerjeeRMB #fine-grained #logic #power management #synthesis #using
Low power synthesis of dynamic logic circuits using fine-grained clock gating (NB, KR, HMM, SB), pp. 862–867.
DATEDATE-2006-Beutel #framework #prototype #using
Fast-prototyping using the BTnode platform (JB), pp. 977–982.
DATEDATE-2006-BudnikR #distributed #network #novel #power management #using
Minimizing ohmic loss and supply voltage variation using a novel distributed power supply network (MMB, KR), pp. 1116–1121.
DATEDATE-2006-ChaoWCWC #using
Coverage loss by using space compactors in presence of unknown values (MCTC, SW, STC, WW, KTC), pp. 1053–1054.
DATEDATE-2006-CherrounDF #constraints #equation #scheduling #using
Scheduling under resource constraints using dis-equations (HC, AD, PF), pp. 1067–1072.
DATEDATE-2006-DuttA #incremental #locality #performance #using
Efficient timing-driven incremental routing for VLSI circuits using DFS and localized slack-satisfaction computations (SD, HA), pp. 768–773.
DATEDATE-2006-FrehseKR #abstraction #refinement #using #verification
Verifying analog oscillator circuits using forward/backward abstraction refinement (GF, BHK, RAR), pp. 257–262.
DATEDATE-2006-GandhiM #energy #multi #using
Exploiting data-dependent slack using dynamic multi-VDD to minimize energy consumption in datapath circuits (KRG, NRM), pp. 1001–1006.
DATEDATE-2006-GuillotBRCGA #diagrams #performance #using
Efficient factorization of DSP transforms using taylor expansion diagrams (JG, EB, QR, MJC, DGP, SA), pp. 754–755.
DATEDATE-2006-HabibiTSLM #performance #using #verification
Efficient assertion based verification using TLM (AH, ST, AS, DL, OAM), pp. 106–111.
DATEDATE-2006-HeniaE #multi #using
Improved offset-analysis using multiple timing-references (RH, RE), pp. 450–455.
DATEDATE-2006-HosangadiFK #optimisation #using
Optimizing high speed arithmetic circuits using three-term extraction (AH, FF, RK), pp. 1294–1299.
DATEDATE-2006-KanajanZPS #architecture #distributed #integration #trade-off #using
Exploring trade-off’s between centralized versus decentralized automotive architectures using a virtual integration environment (SK, HZ, CP, ALSV), pp. 548–553.
DATEDATE-2006-KarlssonEP #design #petri net #representation #using #verification
Formal verification of systemc designs using a petri-net based representation (DK, PE, ZP), pp. 1228–1233.
DATEDATE-2006-KavousianosKN #multi #performance #testing #using
Efficient test-data compression for IP cores using multilevel Huffman coding (XK, EK, DN), pp. 1033–1038.
DATEDATE-2006-KempfKWALM #estimation #fine-grained #framework #performance #using
A SW performance estimation framework for early system-level-design using fine-grained instrumentation (TK, KK, SW, GA, RL, HM), pp. 468–473.
DATEDATE-2006-KimHG #execution #parallel #using
Parallel co-simulation using virtual synchronization with redundant host execution (DK, SH, RG), pp. 1151–1156.
DATEDATE-2006-KooM #functional #generative #pipes and filters #testing #using #validation
Functional test generation using property decompositions for validation of pipelined processors (HMK, PM), pp. 1240–1245.
DATEDATE-2006-KrautzP0TWV #detection #fault #formal method #logic #using
Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
DATEDATE-2006-LeeKKCY #adaptation #using
A network-on-chip with 3Gbps/wire serialized on-chip interconnect using adaptive control schemes (SJL, KK, HK, NC, HJY), pp. 79–80.
DATEDATE-2006-LiuI #optimisation #scheduling #using
Test scheduling with thermal optimization for network-on-chip systems using variable-rate on-chip clocking (CL, VI), pp. 652–657.
DATEDATE-2006-MartinezLC #order #reduction #using
Nonlinear model order reduction using remainder functions (JAM, SPL, DMC), pp. 281–282.
DATEDATE-2006-Maurer #simulation #symmetry #using
Using conjugate symmetries to enhance gate-level simulations (PMM), pp. 638–643.
DATEDATE-2006-MeiR #analysis #performance #using
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-MuraliCRGM #multi #network
A methodology for mapping multiple use-cases onto networks on chips (SM, MC, AR, KG, GDM), pp. 118–123.
DATEDATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread #using
An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
DATEDATE-2006-SethuramanV #architecture #automation #generative #multi #named #using
optiMap: a tool for automated generation of noc architectures using multi-port routers for FPGAs (BS, RV), pp. 947–952.
DATEDATE-2006-SridharanC #modelling #multi #using
Modeling multiple input switching of CMOS gates in DSM technology using HDMR (JS, TC), pp. 626–631.
DATEDATE-2006-TanjiWKA #analysis #scalability #using
Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
DATEDATE-2006-TsengLC #2d #using
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap (TWT, JFL, DMC), pp. 53–58.
DATEDATE-2006-WangBC #performance #using
Efficient unknown blocking using LFSR reseeding (SW, KJB, STC), pp. 1051–1052.
DATEDATE-2006-WangCG #fault #formal method #probability #testing #using
Test set enrichment using a probabilistic fault model and the theory of output deviations (ZW, KC, MG), pp. 1270–1275.
DATEDATE-2006-WildHO #architecture #evaluation #performance #simulation #transaction #using
Performance evaluation for system-on-chip architectures using trace-based transaction level simulation (TW, AH, RO), pp. 248–253.
DATEDATE-2006-ZengI #concurrent #testing #using
Concurrent core test for SOC using shared test set and scan chain disable (GZ, HI), pp. 1045–1050.
DATEDATE-2006-ZhouSMS #analysis #composition #grid #power management #scalability #using
Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
DocEngDocEng-2006-GormishS #documentation #editing #image #standard #using
Standards based high resolution Document editing using low resolution proxy images (MJG, ELS), p. 33.
DocEngDocEng-2006-QeliF #aspect-oriented #documentation #programming #using #xml #xpath
Filtering XML documents using XPath expressions and aspect-oriented programming (EQ, BF), pp. 85–87.
DocEngDocEng-2006-QeliGF #detection #documentation #using #xml #xpath
Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
DRRDRR-2006-TaghvaBCBPN #automation #information management #relational #using
Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
HTHT-2006-Delort #documentation #identification #using
Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
HTHT-2006-Ruddle #hypermedia #navigation #string #using
Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
PODSPODS-2006-GoelGM #modelling #optimisation #using
Asking the right questions: model-driven optimization using probes (AG, SG, KM), pp. 203–212.
SIGMODSIGMOD-2006-DengR #approximate #detection #streaming #using
Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
SIGMODSIGMOD-2006-GawlickKL #database #declarative #using
Using the oracle database as a declarative RSS hub (DG, MK, ZHL), p. 722.
SIGMODSIGMOD-2006-GouKC #evaluation #performance #query #using
Query evaluation using overlapping views: completeness and efficiency (GG, MK, RC), pp. 37–48.
SIGMODSIGMOD-2006-KoudasMS #case study #experience #using
Using SPIDER: an experience report (NK, AM, DS), p. 719.
SIGMODSIGMOD-2006-LimLLWS #data type #query #using
Continuous query processing in data streams using duality of data and queries (HSL, JGL, MJL, KYW, IYS), pp. 313–324.
SIGMODSIGMOD-2006-OnoseDPC #query #using #xml
Rewriting nested XML queries using nested views (NO, AD, YP, EC), pp. 443–454.
VLDBVLDB-2006-BunemanCFK #distributed #partial evaluation #query #using
Using Partial Evaluation in Distributed Query Evaluation (PB, GC, WF, AK), pp. 211–222.
VLDBVLDB-2006-DasGKT #query #using
Answering Top-k Queries Using Views (GD, DG, NK, DT), pp. 451–462.
VLDBVLDB-2006-HuangCLL #evolution #using #xml
XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
VLDBVLDB-2006-LakshmananWZ #query #using
Answering Tree Pattern Queries Using Views (LVSL, WHW, Z(Z), pp. 571–582.
VLDBVLDB-2006-MorfoniosI #using
CURE for Cubes: Cubing Using a ROLAP Engine (KM, YEI), pp. 379–390.
VLDBVLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity #using
Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
VLDBVLDB-2006-ZhangZWSP #feedback #image #interactive #using
Using High Dimensional Indexes to Support Relevance Feedback Based Interactive Images Retrival (JZ, XZ, WW, BS, JP), pp. 1211–1214.
CSEETCSEET-2006-BurgeT #case study #challenge #education #re-engineering #using
Rising to the Challenge: Using Business-Oriented Case Studies in Software Engineering Education (JEB, DT), pp. 43–50.
ITiCSEITiCSE-2006-AssuncaoO #dot-net #education #framework #using #web #web service
Teaching web services using .NET platform (LA, ALO), p. 339.
ITiCSEITiCSE-2006-Chamillard #education #performance #predict #student #using
Using student performance predictions in a computer science curriculum (ATC), pp. 260–264.
ITiCSEITiCSE-2006-DaviesCT #education #ontology #using
Using a computing ontology for educational purposes (GD, LNC, HT), p. 334.
ITiCSEITiCSE-2006-Godejord #education #social #using
Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
ITiCSEITiCSE-2006-HoodH #education #project management #simulation #using
Teaching software project management using simulations (DJH, CSH), pp. 289–293.
ITiCSEITiCSE-2006-LeidigFL #information management
The use of community-based non-profit organizations in information systems capstone projects (PML, RCF, JL), pp. 148–152.
ITiCSEITiCSE-2006-ShanmugasundaramJH #using #visualisation
Knowledge building using visualizations (VS, PJ, CDH), pp. 23–27.
ITiCSEITiCSE-2006-SpaccoHPEHP #case study #design #experience #programming #testing #using
Experiences with marmoset: designing and using an advanced submission and testing system for programming courses (JS, DH, WP, FE, JKH, NPP), pp. 13–17.
ITiCSEITiCSE-2006-ThomasWS #automation #using
Using patterns in the automatic marking of ER-diagrams (PGT, KGW, NS), pp. 83–87.
ITiCSEITiCSE-2006-Utting #education #java #problem #programming #using
Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME (IU), pp. 193–196.
FASEFASE-2006-KobW #calculus #debugging #using
Fundamentals of Debugging Using a Resolution Calculus (DK, FW), pp. 278–292.
FASEFASE-2006-RobbyDK #design #flexibility #metric #predict #using
Using Design Metrics for Predicting System Flexibility (R, SAD, VAK), pp. 184–198.
TACASTACAS-2006-ThomasCP #performance #reachability #using
Efficient Guided Symbolic Reachability Using Reachability Expressions (DT, SC, PKP), pp. 120–134.
SCAMSCAM-J-2005-ZhangBCD06 #using
Using source transformation to test and model check implicit-invocation systems (HZ, JSB, JRC, JD), pp. 209–227.
CSMRCSMR-2006-GraafWD #architecture #migration #model transformation #using
Migrating Supervisory Control Architectures Using Model Transformations (BG, SW, AvD), pp. 153–164.
CSMRCSMR-2006-IvkovicK #architecture #framework #model transformation #refactoring #semantics #using
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations (II, KK), pp. 135–144.
CSMRCSMR-2006-TonuAT #approach #architecture #using
Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
CSMRCSMR-2006-WierdaDS #architecture #case study #clustering #using
Using Version Information in Architectural Clustering — A Case Study (AW, ED, LJS), pp. 214–228.
ICPCICPC-2006-BermanDGG #comprehension #using
The Sound of Software: Using Sonification to Aid Comprehension (LIB, SD, KBG, NG), pp. 225–229.
ICPCICPC-2006-JetleyZI #analysis #slicing #using
Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPCICPC-2006-JinC #reverse engineering #tool support #using
Integrating Reverse Engineering Tools Using a Service-Sharing Methodology (DJ, JRC), pp. 94–99.
ICPCICPC-2006-KothariSMH #clustering #evolution #using
Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
ICPCICPC-2006-LawrieFB #assessment #information retrieval #quality #using
Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
ICPCICPC-2006-SafyallahS #dynamic analysis #execution #mining #using
Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
ICPCICPC-2006-StefikFA #comprehension #debugging #effectiveness #music #runtime #using
Layered Program Auralization: Using Music to Increase Runtime Program Comprehension and Debugging Effectiveness (AS, KF, RTA), pp. 89–93.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSMEICSM-2006-FisherCZ #comprehension #difference #using
Using Sex Differences to Link Spatial Cognition and Program Comprehension (MF, AC, LZ), pp. 289–298.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code #using
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSMEICSM-2006-Hou #constraints #design #source code #using
Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSMEICSM-2006-JaffriK #performance #using
Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
ICSMEICSM-2006-LuciaPOZ #comprehension #named #traceability #using
COCONUT: COde COmprehension Nurturant Using Traceability (ADL, MDP, RO, FZ), pp. 274–275.
ICSMEICSM-2006-TonellaAS #ranking #testing #using
Using the Case-Based Ranking Methodology for Test Case Prioritization (PT, PA, AS), pp. 123–133.
ICSMEICSM-2006-ZhangCZ #e-commerce #process #re-engineering #user interface #using
Reengineering User Interfaces of E-Commerce Applications Using Business Processes (QZ, RC, YZ), pp. 428–437.
MSRMSR-2006-GermanRS #comprehension #using
Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
MSRMSR-2006-KakimotoMKTTM #identification #using
Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
MSRMSR-2006-SagerBPK #algorithm #detection #java #using
Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
MSRMSR-2006-TsunodaMKKM #developer #using
Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
SCAMSCAM-2006-BoogerdM #profiling #using
Prioritizing Software Inspection Results using Static Profiling (CB, LM), pp. 149–160.
SCAMSCAM-2006-PanKW #classification #debugging #metric #slicing #using
Bug Classification Using Program Slicing Metrics (KP, SK, EJWJ), pp. 31–42.
SCAMSCAM-2006-WalensteinMCL #normalisation #term rewriting #using
Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
WCREWCRE-2006-BeyerH #evolution #using #visualisation
Animated Visualization of Software History using Evolution Storyboards (DB, AEH), pp. 199–210.
WCREWCRE-2006-Cerulo #development #on the #process
On the Use of Process Trails to Understand Software Development (LC), pp. 303–304.
WCREWCRE-2006-CleveHH #dependence #graph #reverse engineering #using
Data Reverse Engineering using System Dependency Graphs (AC, JH, JLH), pp. 157–166.
WCREWCRE-2006-KoschkeFF #clone detection #detection #syntax #using
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
WCREWCRE-2006-LormansGDSS #case study #industrial #monitoring #requirements #using
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study (ML, HGG, AvD, RvS, AS), pp. 275–284.
PEPMPEPM-2006-Edwards #fixpoint #simulation #using
Using program specialization to speed SystemC fixed-point simulation (SAE), pp. 21–28.
PLDIPLDI-2006-LauAHC #online #optimisation #performance #using
Online performance auditing: using hot optimizations without getting burned (JL, MA, MH, BC), pp. 239–251.
SASSAS-2006-Arnold #analysis #logic #refinement #using
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SASSAS-2006-ChangHN #analysis #low level #using
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
STOCSTOC-2006-Clarkson #using
Building triangulations using epsilon-nets (KLC), pp. 326–335.
STOCSTOC-2006-KhandekarRV #clustering #graph #using
Graph partitioning using single commodity flows (RK, SR, UVV), pp. 385–390.
FLOPSFLOPS-2006-DiscoloHMJS #data type #haskell #using
Lock Free Data Structures Using STM in Haskell (AD, TH, SM, SLPJ, SS), pp. 65–80.
FLOPSFLOPS-2006-Tozawa #transducer #type checking #using #xml
XML Type Checking Using High-Level Tree Transducer (AT), pp. 81–96.
CIAACIAA-2006-AntoniouHIMP #automaton #finite #using
Finding Common Motifs with Gaps Using Finite Automata (PA, JH, CSI, BM, PP), pp. 69–77.
DLTDLT-2006-Domaratzki #using
Characterizing DNA Bond Shapes Using Trajectories (MD), pp. 180–191.
DLTDLT-2006-GurevichW #question #state machine
Can Abstract State Machines Be Useful in Language Theory? (YG, CW), pp. 14–19.
ICALPICALP-v1-2006-Radhakrishnan #lazy evaluation #random #using
Gap Amplification in PCPs Using Lazy Random Walks (JR), pp. 96–107.
ICALPICALP-v2-2006-DodisR #on the #quantum #using
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer (YD, RR), pp. 204–215.
FMFM-2006-Boute #formal method #independence #problem #using
Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FMFM-2006-DelahayeED #security #using
Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
FMFM-2006-Preoteasa #logic #pointer #recursion #using #verification
Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
FMFM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving #using
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
FMFM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented #using
Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
SEFMSEFM-2006-RodriguesBCFG #approach #using
A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
SEFMSEFM-2006-ZhangHW #component #declarative #modelling #performance #scheduling #uml #using
Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time (YZ, TH, JW), pp. 246–258.
SFMSFM-2006-Harrison #float #proving #theorem proving #using #verification
Floating-Point Verification Using Theorem Proving (JH), pp. 211–242.
ICFPICFP-2006-HickeyNYK #hybrid #representation #using
Mechanized meta-reasoning using a hybrid HOAS/de bruijn representation and reflection (JH, AN, XY, AK), pp. 172–183.
IFLIFL-2006-TrojahnerGS #array #on the #optimisation #source code #using
On Optimising Shape-Generic Array Programs Using Symbolic Structural Information (KT, CG, SBS), pp. 1–18.
ICGTICGT-2006-BaresiS #alloy #graph transformation #on the
On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
ICGTICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability #using
Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
CHICHI-2006-BentleyMH #music
Personal vs. commercial content: the similarities between consumer use of photos and music (FB, CJM, GH), pp. 667–676.
CHICHI-2006-BonhardHMS #recommendation #similarity #using
Accounting for taste: using profile similarity to improve recommender systems (PB, CH, JDM, MAS), pp. 1057–1066.
CHICHI-2006-CosleyFTR #bibliography #community #using
Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
CHICHI-2006-DillonKCB #using #visual notation
Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
CHICHI-2006-GrossmanHBAB #using
Hover widgets: using the tracking state to extend the capabilities of pen-operated devices (TG, KH, PB, MA, RB), pp. 861–870.
CHICHI-2006-JiangOMS #interactive #pointer #using
Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
CHICHI-2006-KramerOF #communication #using
Using linguistic features to measure presence in computer-mediated communication (ADIK, LMO, SRF), pp. 913–916.
CHICHI-2006-LukPLMLH #design #interactive #mobile #prototype #using
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype (JL, JP, SL, KEM, VL, VH), pp. 171–180.
CHICHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online #using
Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHICHI-2006-MunteanuBPTJ #recognition #speech #usability
The effect of speech recognition accuracy rates on the usefulness and usability of webcast archives (CM, RB, GP, EGT, DJ), pp. 493–502.
CHICHI-2006-PrabakerBC #authoring #documentation #evaluation #programming #using
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
CHICHI-2006-PuVF #using
Increasing user decision accuracy using suggestions (PP, PV, BF), pp. 121–130.
CHICHI-2006-ShklovskiKC #internet
Routine patterns of internet use & psychological well-being: coping with a residential move (IS, REK, JNC), pp. 969–978.
CHICHI-2006-WeiszEK
Synchronous broadcast messaging: the use of ICT (JDW, TE, WAK), pp. 1293–1302.
CHICHI-2006-WilsonA #game studies #using
Text entry using a dual joystick game controller (ADW, MA), pp. 475–478.
CHICHI-2006-ZhaoAH #multi #using
Zone and polygon menus: using relative position to increase the breadth of multi-stroke marking menus (SZ, MA, KH), pp. 1077–1086.
CSCWCSCW-2006-KayanFS #difference
Cultural differences in the use of instant messaging in Asia and North America (SK, SRF, LDS), pp. 525–528.
CSCWCSCW-2006-NomuraHH
The uses of paper in commercial airline flight operations (SN, EH, BEH), pp. 249–258.
CSCWCSCW-2006-TangLMLD #interactive #using
Unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction (JCT, SBL, MJM, JL, CD), pp. 479–482.
SOFTVISSOFTVIS-2006-AlspaughTB #social #using #visualisation
Using social agents to visualize software scenarios (TAA, BT, EB), pp. 87–94.
SOFTVISSOFTVIS-2006-AnslowMNB #3d #visualisation
Evaluating X3D for use in software visualization (CA, SM, JN, RB), pp. 161–162.
SOFTVISSOFTVIS-2006-Reiss #abstraction #execution #using #visualisation
Visualizing program execution using user abstractions (SPR), pp. 125–134.
AdaEuropeAdaEurope-2006-Maurer #ada #using
Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
AdaSIGAda-2006-Carlisle #ada #automation #generative #object-oriented #parsing #using
Automatic OO parser generation using visitors for Ada 2005 (MCC), pp. 3–8.
AdaSIGAda-2006-Klein #ada
Use of Ada in Lockheed Martin for air traffic management and beyond (JK), p. 1.
AdaSIGAda-2006-Taft #ada #exclamation #using #why
Why you should be using Ada 2005 now! (STT), p. 75.
EDOCEDOC-2006-BarrettP #automation #composition #modelling #semantics #using #web #web service
Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics (RB, CP), pp. 417–422.
EDOCEDOC-2006-DongYZ #composition #petri net #testing #using #web #web service
Testing BPEL-based Web Service Composition Using High-level Petri Nets (WLD, HY, YBZ), pp. 441–444.
EDOCEDOC-2006-KunduB #using #xml
Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
EDOCEDOC-2006-YanZY #contract #modelling #ontology #owl #semantics #using
Ontology Modeling for Contract: Using OWL to Express Semantic Relations (YY, JZ, MY), pp. 409–412.
ICEISICEIS-AIDSS-2006-AbdullahPBK #architecture #development #information management #knowledge-based #modelling #uml #using
Knowledge Engineering Using the UML Profile — Adopting the Model-Driven Architecture for Knowledge-Based System Development (MSA, RFP, IDB, CK), pp. 74–81.
ICEISICEIS-AIDSS-2006-ProchazkaKK #fuzzy #information management #petri net #process #using
Various Process Wizard for Information Systems — Using Fuzzy Petri Nets for Process Definition (JP, JK, CK), pp. 235–242.
ICEISICEIS-AIDSS-2006-ThuD #predict #risk management #using
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
ICEISICEIS-DISI-2006-BraunerCBL #using
Using Gazetteers to Annotate Geographic Catalog Entries (DFB, MAC, KKB, LAPPL), pp. 215–220.
ICEISICEIS-DISI-2006-Eessaar #database #relational #repository #using
Using Relational Databases in the Engineering Repository Systems (EE), pp. 30–37.
ICEISICEIS-DISI-2006-PatroARMB #case study #database #information management #integration #using
Databases and Information Systems Integration Using CALOPUS: A Case Study (PKP, PA, MR, RMV, SB), pp. 200–207.
ICEISICEIS-HCI-2006-BadjioP #analysis #data mining #mining #process #visual notation
Context of Use Analysis — Activity Checklist for Visual Data Mining (EPFB, FP), pp. 45–50.
ICEISICEIS-HCI-2006-Bakhtyari #automation #feedback #generative #ontology #student #using
Automatic Feedback Generation — Using Ontology in an Intelligent Tutoring System for Both Learner and Author Based on Student Model (PB), pp. 116–123.
ICEISICEIS-HCI-2006-LiSB #correlation #hybrid #recognition #sketching #synthesis #using
Face Recognition from Sketches Using Advanced Correlation Filters Using Hybrid Eigenanalysis for Face Synthesis (YhL, MS, VB), pp. 11–18.
ICEISICEIS-ISAS-2006-BokhariP #information management #petri net #using #validation
Validation of Information Systems Using Petri Nets (AB, WFSP), pp. 284–289.
ICEISICEIS-ISAS-2006-ChengP #aspect-oriented #bibliography #development #embedded #realtime #resource management #scheduling #using
Using Aspect-Oriented Software Development in Real-Time Embedded Systems Software — A Review of Scheduling, Resource Allocation and Synchronization (PLC, GAP), pp. 388–393.
ICEISICEIS-ISAS-2006-CostelloFMLD #approach #distributed #framework #modelling #named #process #using
iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
ICEISICEIS-ISAS-2006-DasguptaSKG #hybrid #modelling #re-engineering #using
Hybrid Modeling Using I* and Agentspeak(L) Agents in Agent Oriented Software Engineering (AD, FS, AK, AKG), pp. 420–425.
ICEISICEIS-ISAS-2006-RinderleBRB #case study #challenge #process #visualisation
Business Process Visualization — Use Cases, Challenges, Solutions (SR, RB, MR, TB), pp. 204–211.
ICEISICEIS-ISAS-2006-ShishkovQ #modelling #process #refinement #using
Refinement of SDBC Business Process Models Using ISDL (BS, DACQ), pp. 61–69.
ICEISICEIS-ISAS-2006-ZdravkovicH #flexibility #process #using
Flexible Realization of Business Processes Using Existing Services (JZ, MH), pp. 165–172.
ICEISICEIS-J-2006-PourrazV #approach #architecture #evolution #using
Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
ICEISICEIS-SAIC-2006-KoutsomitropoulosMKP #information management #logic #using
OWL-Based Knowledge Discovery Using Description Logics Reasoners (DAK, DPM, ANK, TSP), pp. 43–50.
ICEISICEIS-SAIC-2006-MartinelliSS #using
E-Procurement Adoption among Italian Firms by Using Domain Names (MM, IS, MS), pp. 124–131.
ICEISICEIS-SAIC-2006-SchwindG #combinator #grid #resource management #using
Using Shadow Prices for Resource Allocation in a Combinatorial Grid with Proxy-Bidding Agents (MS, OG), pp. 11–18.
CIKMCIKM-2006-BoydellS #community #personalisation #using #web
Capturing community search expertise for personalized web search using snippet-indexes (OB, BS), pp. 277–286.
CIKMCIKM-2006-ChirkovaS #optimisation #query #using
Query optimization using restructured views (RC, FS), pp. 642–651.
CIKMCIKM-2006-HoseLS #distributed #summary #using
Processing relaxed skylines in PDMS using distributed data summaries (KH, CL, KUS), pp. 425–434.
CIKMCIKM-2006-LiC #detection #topic #using
Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
CIKMCIKM-2006-MarsoloPR #query #using
Structure-based querying of proteins using wavelets (KM, SP, KR), pp. 24–33.
CIKMCIKM-2006-Melucci #ranking #using
Ranking in context using vector spaces (MM), pp. 866–867.
CIKMCIKM-2006-QamraTC #clustering #mining #using
Mining blog stories using community-based and temporal clustering (AQ, BLT, EYC), pp. 58–67.
CIKMCIKM-2006-RanganathanL #database #information retrieval #query #relational #semantics #using
Information retrieval from relational databases using semantic queries (AR, ZL), pp. 820–821.
CIKMCIKM-2006-YangJZNX #clustering #documentation #ranking #using #validation
Document re-ranking using cluster validation and label propagation (LY, DHJ, GZ, NY, GX), pp. 690–697.
CIKMCIKM-2006-ZhuangC #query #ranking #using
Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
CIKMCIKM-2006-ZieglerSL #automation #proximity #semantics #taxonomy #using
Automatic computation of semantic proximity using taxonomic knowledge (CNZ, KS, GL), pp. 465–474.
ECIRECIR-2006-ChenOT #image #memory management #using
Browsing Personal Images Using Episodic Memory (Time + Location) (CC, MPO, JT), pp. 362–372.
ECIRECIR-2006-KarbasiB #documentation #effectiveness #normalisation #scalability #using
Document Length Normalization Using Effective Level of Term Frequency in Large Collections (SK, MB), pp. 72–83.
ECIRECIR-2006-RodeH #query #using
Using Query Profiles for Clarification (HR, DH), pp. 205–216.
ECIRECIR-2006-WanY #documentation #similarity #using
Using Proportional Transportation Distances for Measuring Document Similarity (XW, JY), pp. 25–36.
ECIRECIR-2006-WenRB #behaviour #online #topic
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
ECIRECIR-2006-YamoutOT #feedback #using
Relevance Feedback Using Weight Propagation (FY, MPO, JT), pp. 575–578.
ECIRECIR-2006-ZhouZH #approach #concept #information retrieval #modelling #using
Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
ICMLICML-2006-AbbeelQN #learning #modelling #using
Using inaccurate models in reinforcement learning (PA, MQ, AYN), pp. 1–8.
ICMLICML-2006-BezakovaKS #graph #using
Graph model selection using maximum likelihood (IB, AK, RS), pp. 105–112.
ICMLICML-2006-BowlingMJNW #learning #policy #predict #using
Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICMLICML-2006-DeCoste #collaboration #matrix #predict #using
Collaborative prediction using ensembles of Maximum Margin Matrix Factorizations (DD), pp. 249–256.
ICMLICML-2006-LeeGW #classification #using
Using query-specific variance estimates to combine Bayesian classifiers (CHL, RG, SW), pp. 529–536.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process #using
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICMLICML-2006-RainaNK #learning #using
Constructing informative priors using transfer learning (RR, AYN, DK), pp. 713–720.
ICMLICML-2006-SilvaBBE #detection #using
Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
ICMLICML-2006-TeoV #array #kernel #performance #string #using
Fast and space efficient string kernels using suffix arrays (CHT, SVNV), pp. 929–936.
ICMLICML-2006-XiKSWR #classification #performance #reduction #using
Fast time series classification using numerosity reduction (XX, EJK, CRS, LW, CAR), pp. 1033–1040.
ICPRICPR-v1-2006-AhmadL #image #multi #recognition #sequence #using
HMM-based Human Action Recognition Using Multiview Image Sequences (MA, SWL), pp. 263–266.
ICPRICPR-v1-2006-ArandjelovicC #classification #set #using
Face Set Classification using Maximally Probable Mutual Modes (OA, RC), pp. 511–514.
ICPRICPR-v1-2006-AsharafM #clustering #scalability #using
Scalable non-linear Support Vector Machine using hierarchical clustering (SA, MNM), pp. 908–911.
ICPRICPR-v1-2006-BabaMA #geometry #using
A Unified Camera Calibration Using Geometry and Blur of Feature Points (MB, MM, NA), pp. 816–819.
ICPRICPR-v1-2006-BartelsWM #generative #using
DTM Generation from LIDAR Data using Skewness Balancing (MB, HW, DCM), pp. 566–569.
ICPRICPR-v1-2006-Bayro-CorrochanoM #algebra #fuzzy #geometry #logic #using
Object Manipulation using Fuzzy Logic and Geometric Algebra (EBC, RMC), pp. 1120–1123.
ICPRICPR-v1-2006-BenjellounTM #detection #using
Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPRICPR-v1-2006-Bernier #3d #realtime #using
Real-Time 3D Articulated Pose Tracking using Particle Filters Interacting through Belief Propagation (OB), pp. 90–93.
ICPRICPR-v1-2006-BerrettiBP #3d #clustering #using
Partitioning of 3D Meshes using Reeb Gra (SB, ADB, PP), pp. 19–22.
ICPRICPR-v1-2006-BhattacharyaRD #clustering #fuzzy #image #representation #retrieval #semantics #using
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 929–935.
ICPRICPR-v1-2006-BuenaposadaM #animation #independence #performance #using
Performance driven facial animation using illumination independent appearance-based tracking (JMB, EM), pp. 303–306.
ICPRICPR-v1-2006-CaoXF #constant #self #using
Self-Calibration Using Constant Camera Motion (XC, JX, HF), pp. 595–598.
ICPRICPR-v1-2006-ChangCYY #estimation #interactive #realtime #using
An Intelligent Bulletin Board System with Real-time Vision-based Interaction Using Head Pose Estimation (CYC, PCC, YSY, JFY), pp. 1140–1143.
ICPRICPR-v1-2006-ChaoTTJ #detection #fault #using
Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
ICPRICPR-v1-2006-ChenCLT #algorithm #automation #graph #image #segmentation #using
Automatic Segmentation of Lung Fields from Radiographic Images of SARS Patients Using a New Graph Cuts Algorithm (SC, LC, JL, XT), pp. 271–274.
ICPRICPR-v1-2006-ChenHHH #segmentation #using
Segmentation of Human Body Parts Using Deformable Triangulation (CCC, JWH, YTH, CYH), pp. 355–358.
ICPRICPR-v1-2006-ConduracheA #2d #classification #image #linear #segmentation #using
Vessel Segmentation in 2D-Projection Images Using a Supervised Linear Hysteresis Classifier (AC, TA), pp. 343–346.
ICPRICPR-v1-2006-DongWH #gesture #segmentation #sequence #similarity #using #video
Gesture Segmentation from a Video Sequence Using Greedy Similarity Measure (QD, YW, ZH), pp. 331–334.
ICPRICPR-v1-2006-DoYC #detection #estimation #using
Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPRICPR-v1-2006-DuCXL #interactive #network #process #using
Recognizing Interaction Activities using Dynamic Bayesian Network (YD, FC, WX, YL), pp. 618–621.
ICPRICPR-v1-2006-FaggianPC #recognition #segmentation #using #video
Face Recognition From Video using Active Appearance Model Segmentation (NF, APP, TJC), pp. 287–290.
ICPRICPR-v1-2006-FrippWCO #3d #automation #modelling #segmentation #using
Automatic Segmentation of the Knee Bones using 3D Active Shape Models (JF, SKW, SC, SO), pp. 167–170.
ICPRICPR-v1-2006-FuTC #orthogonal #using
Specular Free Spectral Imaging Using Orthogonal Subspace Projection (ZF, RTT, TC), pp. 812–815.
ICPRICPR-v1-2006-GaoWFZ #recognition #using
Face Recognition Using Most Discriminative Local and Global Features (YG, YW, XF, XZ), pp. 351–354.
ICPRICPR-v1-2006-ItoO #detection #invariant #recognition #using
Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
ICPRICPR-v1-2006-Katayama #using
Camera Calibration with a Transparent Calibration Tool Using Color Filters: Application to Stereo Camera Calibration for a Distant Object (YK), pp. 607–612.
ICPRICPR-v1-2006-KaufholdCHR #classification #recognition #segmentation #using
Recognition and Segmentation of Scene Content using Region-Based Classification (JPK, RC, AH, PR), pp. 755–760.
ICPRICPR-v1-2006-KawasakiFN #3d #using
3D acquisition system using uncalibrated line-laser projec (HK, RF, YN), pp. 1071–1075.
ICPRICPR-v1-2006-KimK #classification #using
Simultaneous Classification and VisualWord Selection using Entropy-based Minimum Description Length (SK, ISK), pp. 650–653.
ICPRICPR-v1-2006-KimK06a #parametricity #using
Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
ICPRICPR-v1-2006-KushalRFPH #locality #modelling #using #visual notation
Audio-Visual Speaker Localization Using Graphical Models (AK, MR, FFL, JP, TSH), pp. 291–294.
ICPRICPR-v1-2006-LaggerF #multi #using
Using Specularities to Recover Multiple Light Sources in the Presence of Texture (PL, PF), pp. 587–590.
ICPRICPR-v1-2006-Lhuillier #effectiveness #fault #using
Effective and Generic Structure from Motion using Angular Error (ML), pp. 67–70.
ICPRICPR-v1-2006-LiangA #using
Fingerprint Matching Using Minutia Polygons (XL, TA), pp. 1046–1049.
ICPRICPR-v1-2006-LiSH #image #recognition #using
Face Recognition using Patch-based Spin Images (YL, WAPS, ERH), pp. 408–411.
ICPRICPR-v1-2006-LiuLYAL #coordination #using
Object Tracking Using Globally Coordinated Nonlinear Manifolds (CBL, RSL, MHY, NA, SEL), pp. 844–847.
ICPRICPR-v1-2006-LladoBA #parametricity #re-engineering #using
Euclidean Reconstruction of Deformable Structure Using a Perspective Camera with Varying Intrinsic Parameters (XL, ADB, LdA), pp. 139–142.
ICPRICPR-v1-2006-Lopez-FrancoB #algebra #geometry #invariant #navigation #using
Omnidirectional Vision and Invariant Theory for Robot Navigation Using Conformal Geometric Algebra (CLF, EBC), pp. 570–573.
ICPRICPR-v1-2006-LublinermanOZC #linear #process #recognition #using #validation
Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
ICPRICPR-v1-2006-MarmoAC #classification #set #using
Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
ICPRICPR-v1-2006-MenezesLD #3d #data fusion #gesture #using
Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot (PM, FL, JD), pp. 464–467.
ICPRICPR-v1-2006-MiaoQS #composition #principle #using
Unsupervised Decomposition of Mixed Pixels Using the Maximum Entropy Principle (LM, HQ, HS), pp. 1067–1070.
ICPRICPR-v1-2006-OhayonR #3d #estimation #robust #using
Robust 3D Head Tracking Using Camera Pose Estimation (SO, ER), pp. 1063–1066.
ICPRICPR-v1-2006-PerrinDZ #2d #3d #assessment #parametricity #process #using
2D and 3D Vegetation Resource Parameters Assessment using Marked Point Processes (GP, XD, JZ), pp. 1–4.
ICPRICPR-v1-2006-PongC #3d #detection #modelling #using
Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
ICPRICPR-v1-2006-PradeepR #using
Improving Shape from Focus Using Defocus Information (KSP, ANR), pp. 731–734.
ICPRICPR-v1-2006-PrehnS #adaptation #algorithm #classification #clustering #incremental #robust #using
An Adaptive Classification Algorithm Using Robust Incremental Clustering (HP, GS), pp. 896–899.
ICPRICPR-v1-2006-PupilliC #3d #modelling #realtime #using
Real-Time Camera Tracking Using Known 3D Models and a Particle Filter (MP, AC), pp. 199–203.
ICPRICPR-v1-2006-QiuGDC #image #optimisation #using
Tone Mapping for HDR Image using Optimization A New Closed Form Solution (GQ, JG, JD, MC), pp. 996–999.
ICPRICPR-v1-2006-RavulapalliS #using #video
Association of Sound to Motion in Video using Perceptual Organization (SR, SS), pp. 1216–1219.
ICPRICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering #using
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPRICPR-v1-2006-RiponTKI #algorithm #clustering #multi #search-based #using
Multi-Objective Evolutionary Clustering using Variable-Length Real Jumping Genes Genetic Algorithm (KSNR, CHT, SK, MKI), pp. 1200–1203.
ICPRICPR-v1-2006-SungLK #realtime #recognition #using
A Real-Time Facial Expression Recognition using the STAAM (JS, SL, DK), pp. 275–278.
ICPRICPR-v1-2006-TakeshimaIK #detection #self #using
Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
ICPRICPR-v1-2006-TakizawaY #3d #modelling #re-engineering #using
Surface Reconstruction from Stereovision Data Using a 3-D MRF of Discrete Object Models (HT, SY), pp. 27–30.
ICPRICPR-v1-2006-TanakaHOK
Use of Viewpoint Information for Example Selection in CBIR (KT, MH, NO, EK), p. 1054.
ICPRICPR-v1-2006-TongWZJ #multi #using
Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
ICPRICPR-v1-2006-TrujilloO #detection #evolution #how #using
Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
ICPRICPR-v1-2006-WangB #3d #automation #estimation #using
Automatic Estimation of 3D Transformations using Skeletons for Object Alignment (TW, AB), pp. 51–54.
ICPRICPR-v1-2006-WeiB #data analysis #segmentation #statistics #using
Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
ICPRICPR-v1-2006-WijewickremaPE #image #re-engineering #using
Reconstruction of Spheres using Occluding Contours from Stereo Images (SNRW, APP, CEE), pp. 151–154.
ICPRICPR-v1-2006-WongC #classification #gesture #recognition #using
Continuous Gesture Recognition using a Sparse Bayesian Classifier (SFW, RC), pp. 1084–1087.
ICPRICPR-v1-2006-WuW #graph #using
Stereo Correspondence Using Stripe Adjacency Graph (CCW, ZFW), pp. 123–126.
ICPRICPR-v1-2006-XieL #animation #markov #modelling #speech #using
Speech Animation Using Coupled Hidden Markov Models (LX, ZQL), pp. 1128–1131.
ICPRICPR-v1-2006-YingZ06a #image #using
Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
ICPRICPR-v1-2006-YinWLB #3d #interactive #using
Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
ICPRICPR-v1-2006-YouZCWT #representation #using
Face Representation By Using Non-tensor Product Wavelets (XY, DZ, QC, PSPW, YYT), pp. 503–506.
ICPRICPR-v1-2006-ZengL #markov #random #segmentation #using
Stroke Segmentation of Chinese Characters Using Markov Random Fields (JZ, ZQL), pp. 868–871.
ICPRICPR-v1-2006-ZhangFX #detection #image #orthogonal #using
Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
ICPRICPR-v1-2006-ZhangSL #multi #segmentation #using
Motion Segmentation by Multibody Trifocal Tensor Using Line Correspondence (JZ, FS, YL), pp. 599–602.
ICPRICPR-v1-2006-ZhangT #documentation #image #using
RestoringWarped Document Images using Shape-from-Shading and Surface Interpolation (LZ, CLT), pp. 642–645.
ICPRICPR-v1-2006-ZhongMH #using
Camera Calibration Using Circle and Right Angles (HZ, FM, YSH), pp. 646–649.
ICPRICPR-v1-2006-ZhouW06a #using #verification
Face Verification Using GaborWavelets and AdaBoost (MZ, HW), pp. 404–407.
ICPRICPR-v2-2006-AhnKB #estimation #graph #robust #segmentation #using
Robust Object Segmentation Using Graph Cut with Object and Background Seed Estimation (JHA, KCK, HB), pp. 361–364.
ICPRICPR-v2-2006-AndelicSKK #hybrid #kernel #modelling #speech #using
A Hybrid HMM-Based Speech Recognizer Using Kernel-Based Discriminants as Acoustic Models (EA, MS, MK, SEK), pp. 1158–1161.
ICPRICPR-v2-2006-ArivazhaganGK #classification #statistics #using
Texture classification using Curvelet Statistical and Co-occurrence Features (SA, LG, TGSK), pp. 938–941.
ICPRICPR-v2-2006-BarakatB #using
Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
ICPRICPR-v2-2006-BhattacharyaRD06a #clustering #fuzzy #image #representation #retrieval #semantics #using
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 1162–1168.
ICPRICPR-v2-2006-BhuiyanN #classification #detection #image #using
Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
ICPRICPR-v2-2006-ChenB #classification #invariant #using
Invariant Texture Classification Using Ridgelet Packets (GC, PB), pp. 464–467.
ICPRICPR-v2-2006-ChenW #analysis #component #independence #segmentation #using
Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPRICPR-v2-2006-ChenY #modelling #using #video
Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
ICPRICPR-v2-2006-ChiangK #classification #using
Classification of Line and Character Pixels on Raster Maps Using Discrete Cosine Transformation Coefficients and Support Vector Machine (YYC, CAK), pp. 1034–1037.
ICPRICPR-v2-2006-ChiuL #invariant #using
Matching Interest Points Using Affine Invariant Concentric Circles (HPC, TLP), pp. 167–170.
ICPRICPR-v2-2006-ChoiLY #classification #feature model #using
Feature Extraction for Bank Note Classification Using Wavelet Transform (EC, JL, JY), pp. 934–937.
ICPRICPR-v2-2006-CourteilleDM #problem #using
A Global Solution to the SFS Problem Using B-spline Surface and Simulated Annealing (FC, JDD, GM), pp. 332–335.
ICPRICPR-v2-2006-DornaikaD #modelling #recognition #using
Facial Expression Recognition using Auto-regressive Models (FD, FD), pp. 520–523.
ICPRICPR-v2-2006-DowsonBK #image #using
Image template matching using Mutual Information and NP-Windows (NDHD, RB, TK), pp. 1186–1191.
ICPRICPR-v2-2006-Ekbal #classification #predict #using
Improvement of Prediction Accuracy Using Discretization and Voting Classifier (AE), pp. 695–698.
ICPRICPR-v2-2006-FangC #detection #robust #statistics #using
Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
ICPRICPR-v2-2006-FloreaBRB #image #representation #using
Using texture-based symbolic features for medical image representation (FF, EB, AR, AB), pp. 946–949.
ICPRICPR-v2-2006-FuLHB #image #retrieval #using
Content-based Image Retrieval Using Gabor-Zernike Features (XF, YL, RWH, SB), pp. 417–420.
ICPRICPR-v2-2006-GanD #relational #using
Differentiating Between Many Similar Features using Relational Information in Space and Scale (TSYG, TD), pp. 638–641.
ICPRICPR-v2-2006-GongY #estimation #orthogonal #programming #using
Disparity Flow Estimation using Orthogonal Reliability-based Dynamic Programming (MG, YHY), pp. 70–73.
ICPRICPR-v2-2006-GrimHSP #approach #modelling #using
A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
ICPRICPR-v2-2006-Guo #perspective #using
Plane Rectification Using a Circle and Points from a Single View (FG), pp. 9–12.
ICPRICPR-v2-2006-GuptaD #detection #multi #using
Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
ICPRICPR-v2-2006-HaindlM #approach #modelling #multi #segmentation #using
Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
ICPRICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string #using
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPRICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation #using
New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
ICPRICPR-v2-2006-Kita #detection #using
Change detection using joint intensity histogram (YK), pp. 351–356.
ICPRICPR-v2-2006-KuijperOBG #2d #set #symmetry #using
Matching 2D Shapes using their Symmetry Sets (AK, OFO, PB, PJG), pp. 179–182.
ICPRICPR-v2-2006-LeS #detection #named #robust #using
Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
ICPRICPR-v2-2006-LiLL #framework #geometry #multi #using
A Geometric Active Contour Framework using Multi-Cue and Local Feature (ZL, QL, HL), pp. 113–116.
ICPRICPR-v2-2006-LiLWH #detection #framework #image #novel #using
A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
ICPRICPR-v2-2006-LimCG #identification #using
Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
ICPRICPR-v2-2006-Liu #classification #feature model #polynomial #recognition #using
High Accuracy Handwritten Chinese Character Recognition Using Quadratic Classifiers with Discriminative Feature Extraction (CLL), pp. 942–945.
ICPRICPR-v2-2006-LiuL #classification #image #using
Genus-Zero Shape Classification Using Spherical Normal Image (SL, JL), pp. 126–129.
ICPRICPR-v2-2006-LocteauRALHT #algorithm #approximate #multi #search-based #using
Approximation of Digital Curves using a Multi-Objective Genetic Algorithm (HL, RR, SA, YL, PH, ÉT), pp. 716–719.
ICPRICPR-v2-2006-Mainar-RuizP #approximate #multi #nearest neighbour #using
Approximate Nearest Neighbor Search using a Single Space-filling Curve and Multiple Representations of the Data Points (GMR, JCPC), pp. 502–505.
ICPRICPR-v2-2006-MakkapatiM #encoding #using
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPRICPR-v2-2006-Mancas-ThillouG #using
Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPRICPR-v2-2006-MaZSCG #estimation #robust #using
Robust Head Pose Estimation Using LGBP (BM, WZ, SS, XC, WG), pp. 512–515.
ICPRICPR-v2-2006-MeleMS #categorisation #image #probability #using
Image Categorization Using Local Probabilistic Descriptors (KM, JM, DS), pp. 336–340.
ICPRICPR-v2-2006-NedzvedAU #pseudo #using
Gray-scale thinning by using a pseudo-distance map (AN, SA, SU), pp. 239–242.
ICPRICPR-v2-2006-OsawaWWY #3d #using
Human Tracking by Particle Filtering Using Full 3D Model of Both Target and Environment (TO, XW, KW, TY), pp. 25–28.
ICPRICPR-v2-2006-PanBD #bottom-up #contest #functional #image #segmentation #using
Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional (YP, JDB, SMD), pp. 117–121.
ICPRICPR-v2-2006-PriorW #fault #parametricity #probability #random #using
Parameter Tuning using the Out-of-Bootstrap Generalisation Error Estimate for Stochastic Discrimination and Random Forests (MP, TW), pp. 498–501.
ICPRICPR-v2-2006-QiaoY06a #bidirectional #image #multi #using
Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search (YQ, MY), pp. 970–973.
ICPRICPR-v2-2006-RamalhoM #detection #image #using
Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
ICPRICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation #using
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-ShiratoriGK #performance #using
An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPRICPR-v2-2006-SomolP #algorithm #feature model #keyword #multi #prototype #using
Multi-Subset Selection for Keyword Extraction and Other Prototype Search Tasks Using Feature Selection Algorithms (PS, PP), pp. 736–739.
ICPRICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering #using
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPRICPR-v2-2006-Sun06a #multi #recognition #using
Multi-Linguistic Optical Font Recognition Using Stroke Templates (HMS), pp. 889–892.
ICPRICPR-v2-2006-SunV #detection #linear #multi #performance #using
Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPRICPR-v2-2006-TangT #analysis #linear #performance #using
Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPRICPR-v2-2006-TerradesTV #adaptation #using
Combination of shape descriptors using an adaptation of boosting (ORT, ST, EV), pp. 764–767.
ICPRICPR-v2-2006-UsoPSG #clustering #multi #using
Clustering-based multispectral band selection using mutual information (AMU, FP, JMS, PGS), pp. 760–763.
ICPRICPR-v2-2006-WangH #equation #probability #using
Probabilistic Relaxation using the Heat Equation (HW, ERH), pp. 666–669.
ICPRICPR-v2-2006-WangZC #locality #performance #using
Efficient Topological Localization Using Orientation Adjacency Coherence Histograms (JW, HZ, RC), pp. 271–274.
ICPRICPR-v2-2006-YangG #composition #invariant #using
Line-Based Affine Invariant Object Location Using Transformation Space Decomposition (RY, YG), pp. 646–649.
ICPRICPR-v2-2006-YangQHE #adaptation #geometry #image #recognition #retrieval #using
Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids (MY, GQ, JH, DE), pp. 958–961.
ICPRICPR-v2-2006-YangS #detection #random #using
Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
ICPRICPR-v2-2006-YaslanC #classification #feature model #music #using
Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ), pp. 573–576.
ICPRICPR-v2-2006-YokobayashiW #correlation #recognition #using
Binarization and Recognition of Degraded Characters Using a Maximum Separability Axis in Color Space and GAT Correlation (MY, TW), pp. 885–888.
ICPRICPR-v2-2006-YuC #image #segmentation #semantics #using
Joint Image Segmentation and Interpretation Using Iterative Semantic Region Growing on SAR Sea Ice Imagery (QY, DAC), pp. 223–226.
ICPRICPR-v2-2006-ZhangJHW #detection #using
Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
ICPRICPR-v2-2006-Zheng #recognition #using
Machine Printed Arabic Character Recognition Using S-GCM (LZ), pp. 893–896.
ICPRICPR-v2-2006-ZhouBS #image #using
Extracting Lines in Noisy Image Using Directional Information (JZ, WFB, GASA), pp. 215–218.
ICPRICPR-v3-2006-AbateNRS #3d #fourier #recognition #using
3D Face Recognition using Normal Sphere and General Fourier Descriptor (AFA, MN, DR, GS), pp. 1183–1186.
ICPRICPR-v3-2006-AbdallahHB #composition #image #performance #robust #using
A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
ICPRICPR-v3-2006-AgrawalK #locality #realtime #using
Real-time Localization in Outdoor Environments using Stereo Vision and Inexpensive GPS (MA, KK), pp. 1063–1068.
ICPRICPR-v3-2006-AlleneP #image #optimisation #using
Image Renaissance Using Discrete Optimization (CA, NP), pp. 631–634.
ICPRICPR-v3-2006-ArreolaFB #classification #linear #performance #using
Fast Support Vector Machine Classification using linear SVMs (KZA, JF, HB), pp. 366–369.
ICPRICPR-v3-2006-AsanoTTTANTHM #using
Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology (AA, TT, AT, CMA, TN, KT, TH, MM), pp. 988–991.
ICPRICPR-v3-2006-AssabieB #recognition #using
Ethiopic Character Recognition Using Direction Field Tensor (YA, JB), pp. 284–287.
ICPRICPR-v3-2006-BarbuRLAHT #algorithm #classification #graph #recognition #search-based #using
Graph Classification Using Genetic Algorithm and Graph Probing Application to Symbol Recognition (EB, RR, HL, SA, PH, ÉT), pp. 296–299.
ICPRICPR-v3-2006-BeleznaiFB #multi #using
Multiple Object Tracking Using Local PCA (CB, BF, HB), pp. 79–82.
ICPRICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes #using
A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
ICPRICPR-v3-2006-BianchiniMS #locality #network #recursion #using
Object Localization Using Input/Output Recursive Neural Networks (MB, MM, LS), pp. 95–98.
ICPRICPR-v3-2006-BouchaffraT #markov #recognition #using
Protein Fold Recognition using a Structural Hidden Markov Model (DB, JT), pp. 186–189.
ICPRICPR-v3-2006-CaronV #evaluation #image #modelling #quality #using
Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
ICPRICPR-v3-2006-ChairunnandaGC #distance #edit distance #sequence #using
Enhancing Edit Distance on Real Sequences Filters using Histogram Distance on Fixed Reference Ordering (PC, VG, LC), pp. 582–585.
ICPRICPR-v3-2006-ChoiAB #segmentation #using
Face Alignment Using Segmentation and a Combined AAM in a PTZ Camera (KC, JHA, HB), pp. 1191–1194.
ICPRICPR-v3-2006-EmmsHW #graph #quantum #using
Graph Matching using Interference of Coined Quantum Walks (DE, ERH, RCW), pp. 133–136.
ICPRICPR-v3-2006-ErikssonA #image #using
Bijective Image Registration using Thin-Plate Splines. (APE, ), pp. 798–801.
ICPRICPR-v3-2006-GuoL #image #multi #using
Multi-modality Image Registration Using Mutual Information Based on Gradient Vector Flow (YG, CCL), pp. 697–700.
ICPRICPR-v3-2006-GutmanWLCT #analysis #using
Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPRICPR-v3-2006-HuangL #image #using
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPRICPR-v3-2006-KananFE #locality #performance #recognition #using
An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPRICPR-v3-2006-KlausSK #adaptation #difference #self #using
Segment-Based Stereo Matching Using Belief Propagation and a Self-Adapting Dissimilarity Measure (AK, MS, KFK), pp. 15–18.
ICPRICPR-v3-2006-KohmuraW #algorithm #search-based #using
Determining Optimal Filters for Binarization of Degraded Characters in Color Using Genetic Algorithms (HK, TW), pp. 661–664.
ICPRICPR-v3-2006-KyweFM #algorithm #image #realtime #scheduling #using
Scheduling of Image Processing Using Anytime Algorithm for Real-time System (WWK, DF, KM), pp. 1095–1098.
ICPRICPR-v3-2006-LakamperL #3d #using
Using Extended EM to Segment Planar Structures in 3D (RL, LJL), pp. 1077–1082.
ICPRICPR-v3-2006-LamL #identification #using
Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
ICPRICPR-v3-2006-LeeE06a #using
Simultaneous Inference of View and Body Pose using Torus Manifolds (CSL, AME), pp. 489–494.
ICPRICPR-v3-2006-LeoputraTL #distributed #using
Non-overlapping Distributed Tracking using Particle Filter (WSL, TT, FLL), pp. 181–185.
ICPRICPR-v3-2006-LernerV #classification #fuzzy #image #search-based #using
Image Classification for Genetic Diagnosis using Fuzzy ARTMAP (BL, BV), pp. 362–365.
ICPRICPR-v3-2006-LiC #classification #nearest neighbour #probability #using
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), pp. 1220–1223.
ICPRICPR-v3-2006-LiPKZ #multimodal #using
Multimodal Registration using the Discrete Wavelet Frame Transform (SL, JP, JTK, JZ), pp. 877–880.
ICPRICPR-v3-2006-MakkapatiM06a #using
Vector Quantization Using Reflections of Triangular Subcodevectors (VM, PRM), pp. 701–704.
ICPRICPR-v3-2006-NgOFGN #automation #image #information management #segmentation #using
Automatic Segmentation of Muscles of Mastication from Magnetic Resonance Images Using Prior Knowledge (HPN, SHO, KWCF, PSG, WLN), pp. 968–971.
ICPRICPR-v3-2006-NguyenSQN #fuzzy #predict #using
Traffic Prediction Using Ying-Yang Fuzzy Cerebellar Model Articulation Controller (MNN, DS, CQ, GSN), pp. 258–261.
ICPRICPR-v3-2006-NieuwenhuisY #image #knowledge base #network #using
Knowledge Based Image Enhancement Using Neural Networks (CN, MY), pp. 814–817.
ICPRICPR-v3-2006-PalenichkaZ #image #network #using
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), pp. 1216–1219.
ICPRICPR-v3-2006-ParkJKKH #multi #named #using #visual notation
ViSE: Visual Search Engine Using Multiple Networked Cameras (UP, AKJ, IK, KK, NH), pp. 1204–1207.
ICPRICPR-v3-2006-ParkLL #3d #using
Superimposing 3D Virtual Objects using Markerless Tracking (SCP, SWL, SWL), pp. 897–900.
ICPRICPR-v3-2006-PetterssonKB #automation #segmentation #using
Automatic Hip Bone Segmentation Using Non-Rigid Registration (JP, HK, MB), pp. 946–949.
ICPRICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability #using
Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
ICPRICPR-v3-2006-QiuH #graph #using
Graph Matching using Commute Time Spanning Trees (HQ, ERH), pp. 1224–1227.
ICPRICPR-v3-2006-QiuXT #clustering #feedback #kernel #performance #using
Efficient Relevance Feedback Using Semi-supervised Kernel-specified K-means Clustering (BQ, CX, QT), pp. 316–319.
ICPRICPR-v3-2006-RendekW #consistency #set #using
Extraction of Consistent Subsets of Descriptors using Choquet Integral (JR, LW), pp. 208–211.
ICPRICPR-v3-2006-SakaiA #detection #metric #using
Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
ICPRICPR-v3-2006-ScheundersB #component #image #multi #using
Wavelet denoising of multicomponent images, using a Gaussian Scale Mixture model (PS, SDB), pp. 754–757.
ICPRICPR-v3-2006-SchlapbachB #identification #modelling #using
Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
ICPRICPR-v3-2006-ShinozakiUGR #image #using
Correction of intensity of a color image using a range intensity image (MS, KU, GG, MR), pp. 774–777.
ICPRICPR-v3-2006-SmithKHI #recognition #using
Face Recognition Using Angular LDA and SVM Ensembles (RSS, JK, MH, JI), pp. 1008–1012.
ICPRICPR-v3-2006-TianK06a #algorithm #distance #performance #using
An Efficient Algorithm for Point Matching Using Hilbert Scanning Distance (LT, SiK), pp. 873–876.
ICPRICPR-v3-2006-Wang06a #analysis #using
Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPRICPR-v3-2006-WangGZLZ #identification #using
Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
ICPRICPR-v3-2006-WangWKH #probability #using #video
Tracking a Variable Number of Human Groups in Video Using Probability Hypothesis Density (YDW, JKW, AAK, WH), pp. 1127–1130.
ICPRICPR-v3-2006-WongWC #classification #robust #using
Robust Appearance-based Tracking using a sparse Bayesian classifier (SFW, KYKW, RC), pp. 47–50.
ICPRICPR-v3-2006-XueD #2d #3d #locality #multi #using
3D+2D Face Localization Using Boosting in Multi-Modal Feature Space (FX, XD), pp. 499–502.
ICPRICPR-v3-2006-XueLF #image #using
Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator (FX, QSL, WF), pp. 766–769.
ICPRICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel #using
Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPRICPR-v3-2006-YamazoeUA #constraints #geometry #multi #optimisation #using
Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints (HY, AU, SA), pp. 960–963.
ICPRICPR-v3-2006-YangL06a #3d #image #learning #sequence #using
Reconstructing 3D Human Body Pose from Stereo Image Sequences Using Hierarchical Human Body Model Learning (HDY, SWL), pp. 1004–1007.
ICPRICPR-v3-2006-YuL #distance #recognition #using
Shape Recognition using Curve Segment Hausdorff Distance (XY, MKHL), pp. 441–444.
ICPRICPR-v3-2006-YunBK #dependence #realtime #recognition #relational #using #visual notation
Real-time Object Recognition using Relational Dependency based on Graphical Model (WHY, SYB, DK), pp. 28–32.
ICPRICPR-v3-2006-ZhangY #image #multi #using
Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPRICPR-v3-2006-ZouariHL #comparison #using
Experimental Comparison of Combination Rules using Simulated Data (HZ, LH, YL), pp. 152–155.
ICPRICPR-v4-2006-AndersenJM #estimation
Estimation of Dynamic Light Changes in Outdoor Scenes Without the use of Calibration Objects (MSA, TJ, CBM), pp. 91–94.
ICPRICPR-v4-2006-ChenLL #using #video
Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
ICPRICPR-v4-2006-ChikkerurPJRB #locality #representation #using
Fingerprint Representation Using Localized Texture Features (SC, SP, AJ, NKR, RMB), pp. 521–524.
ICPRICPR-v4-2006-Choi #cumulative #recognition #robust #speech #using
A Noise Robust Front-end for Speech Recognition Using Hough Transform and Cumulative Distribution Mapping (EHCC), pp. 286–289.
ICPRICPR-v4-2006-CuiZZS #multi #people #robust #using
Robust Tracking of Multiple People in Crowds Using Laser Range Scanners (JC, HZ, HZ, RS), pp. 857–860.
ICPRICPR-v4-2006-DhandraHHM #analysis #image #segmentation #using
Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPRICPR-v4-2006-FengC #invariant #using
Fingerprint Indexing Using Ridge Invariants (JF, AC), pp. 433–436.
ICPRICPR-v4-2006-FusseneggerOP #locality #segmentation #using
Object localization/segmentation using generic shape priors (MF, AO, AP), pp. 41–44.
ICPRICPR-v4-2006-Garcia-PerezMBB #image #retrieval #using
Object-Based Image Retrieval Using Active Nets (DGP, AMG, SB, ADB), pp. 750–753.
ICPRICPR-v4-2006-HafezJ #estimation #using #visual notation
Target Model Estimation using Particle Filters for Visual Servoing (AHAH, CVJ), pp. 651–654.
ICPRICPR-v4-2006-HeYTWX #image #matrix #novel #retrieval #symmetry #using
Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices (ZH, XY, YYT, PSPW, YX), pp. 161–164.
ICPRICPR-v4-2006-JainCD #using
Pores and Ridges: Fingerprint Matching Using Level 3 Features (AKJ, YC, MD), pp. 477–480.
ICPRICPR-v4-2006-KimPL #3d #using
Tracking 3D Human Body using Particle Filter in Moving Monocular Camera (SK, CBP, SWL), pp. 805–808.
ICPRICPR-v4-2006-KropotovPVV #kernel #on the #principle #using
On Kernel Selection in Relevance Vector Machines Using Stability Principle (DK, NP, OV, DV), pp. 233–236.
ICPRICPR-v4-2006-KryszczukD #detection #using
Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
ICPRICPR-v4-2006-KwonYKL #clustering #using
Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPRICPR-v4-2006-KyweYM #lens #using
Contact Lens Extraction by Using Thermo-Vision (WWK, MY, KM), pp. 570–573.
ICPRICPR-v4-2006-LaurendeauB #distance #using
Shape-Based Contour Interpolation and Extrapolation Using Distance Mapping (DL, OB), pp. 659–662.
ICPRICPR-v4-2006-LiC06a #classification #nearest neighbour #probability #using
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), p. 954.
ICPRICPR-v4-2006-LienY #performance #predict #using
A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
ICPRICPR-v4-2006-LiL06a #identification #using
Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
ICPRICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation #using
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPRICPR-v4-2006-LuC06a #3d #analysis #metric #using
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MacenkoCM #detection #segmentation #using
Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
ICPRICPR-v4-2006-MellakhPD #using
Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics (MAM, DPD, BD), pp. 574–577.
ICPRICPR-v4-2006-MoncrieffVW #modelling #using
Unifying Background Models over Complex Audio using Entropy (SM, SV, GAWW), pp. 249–253.
ICPRICPR-v4-2006-NagaharaMIYS #generative #using #video
High-resolution Video Generation Using Morphing (HN, TM, YI, MY, TS), pp. 338–341.
ICPRICPR-v4-2006-NagarC #design #fuzzy #symmetry #using
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
ICPRICPR-v4-2006-NiuG #network #using
Recovering Non-overlapping Network Topology Using Far-field Vehicle Tracking Data (CN, EG), pp. 944–949.
ICPRICPR-v4-2006-NosratighodsAE #novel #set #using #verification
Speaker Verification Using A Novel Set of Dynamic Features (MN, EA, JE), pp. 266–269.
ICPRICPR-v4-2006-Onoguchi #correlation #detection #using
Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
ICPRICPR-v4-2006-PalenichkaZ06a #image #network #using
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), p. 953.
ICPRICPR-v4-2006-QiuH06a #graph #using
Graph Matching using Commute Time Spanning Tr (HQ, ERH), p. 955.
ICPRICPR-v4-2006-QuanZ #using
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
ICPRICPR-v4-2006-ReisertB #3d #data-driven #database #integration #invariant #using
Invariant Features for 3D-Data based on Group Integration using Directional Information and Spherical Harmonic Expansion (MR, HB), pp. 206–209.
ICPRICPR-v4-2006-Rivera-RoveloB #algebra #framework #geometry #realtime #using
Non-Rigid Alignment and Real-Time Tracking Using the Geometric Algebra Framework (JRR, EBC), pp. 675–678.
ICPRICPR-v4-2006-ShaZT #set #using
Minutiae-based Fingerprint Matching Using Subset Combination (LS, FZ, XT), pp. 566–569.
ICPRICPR-v4-2006-ShibuyaU #image #mobile #self #standard #using
Self-Localization of a Mobile Robot Using Compressed Image Data of Average and Standard Deviation (NS, KU), pp. 614–617.
ICPRICPR-v4-2006-SmithH #using
Estimating Cast Shadows using SFS and Class-based Surface Completion (WAPS, ERH), pp. 86–90.
ICPRICPR-v4-2006-SvenssonGFSOS #composition #framework #fuzzy #image #using
Using a fuzzy framework for delineation and decomposition of Immunoglobulin G in cryo electron tomographic images (SS, MG, DF, US, LGO, SS), pp. 687–690.
ICPRICPR-v4-2006-TodorovicA #3d #classification #segmentation #using
3D Texture Classification Using the Belief Net of a Segmentation Tree (ST, NA), pp. 33–36.
ICPRICPR-v4-2006-UranishiNYIMC #metric #using
Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror (YU, MN, YY, MI, YM, KC), pp. 866–869.
ICPRICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime #using
Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
ICPRICPR-v4-2006-WangAC #identification #multi #recognition #using
Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
ICPRICPR-v4-2006-WangC #detection #using #video
Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
ICPRICPR-v4-2006-WangK #approach #automation #estimation #using
Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
ICPRICPR-v4-2006-WangWLJK #analysis #classification #component #independence #using
Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPRICPR-v4-2006-WangXC #2d #automation #classification #pseudo #using #video
Automatic Sports Video Genre Classification using Pseudo-2D-HMM (JW, CX, EC), pp. 778–781.
ICPRICPR-v4-2006-WuQ #geometry #identification #using
A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPRICPR-v4-2006-YamaguchiKN #detection #estimation #using
Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
ICPRICPR-v4-2006-YangG06a #multi #using #verification
Multi-SNR GMMs-Based Noise-Robust Speaker Verification Using 1/fa Noises (LY, WG), pp. 241–244.
ICPRICPR-v4-2006-YaoLYZL06a #algorithm #recognition #using
Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
ICPRICPR-v4-2006-YiA #using
An Omnidirectional Stereo Vision System Using a Single Camera (SY, NA), pp. 861–865.
ICPRICPR-v4-2006-YuanMZL #matrix #recognition #using
Ear Recognition using Improved Non-Negative Matrix Factorization (LY, ZM, YZ, KL), pp. 501–504.
ICPRICPR-v4-2006-YuC06a #segmentation #statistics #using
Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
ICPRICPR-v4-2006-ZaimQSIT #clustering #image #robust #segmentation #using
A Robust and Accurate Segmentation of Iris Images Using Optimal Partitioning (AZ, MKQ, JS, JI, RT), pp. 578–581.
ICPRICPR-v4-2006-ZhaoCLP #recognition #using
Gait Recognition Using Fractal Scale and Wavelet Moments (GZ, LC, HL, MP), pp. 453–456.
ICPRICPR-v4-2006-ZhaoG06a #automation #energy #estimation #modelling #using
Automated Face Pose Estimation Using Elastic Energy Models (SZ, YG), pp. 618–621.
ICPRICPR-v4-2006-ZhaoSC #clustering #using
Fingerprint Registration Using Minutia Clusters and Centroid Structure 1 (DZ, FS, AC), pp. 413–416.
ICPRICPR-v4-2006-ZhengLZ #encryption #generative #using
Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDDKDD-2006-BarbaraDR #detection #statistics #testing #using
Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
KDDKDD-2006-KeCN #approach #correlation #mining #using
Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
KDDKDD-2006-LiuZBX #analysis #using
Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDDKDD-2006-LoekitoB #diagrams #mining #performance #using
Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
KDDKDD-2006-ManiyarN #algorithm #data mining #mining #using #visual notation #visualisation
Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
KDDKDD-2006-NathBM #approach #classification #clustering #scalability #using
Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
KDDKDD-2006-RattiganMJ #approximate #network #performance #using
Using structure indices for efficient approximation of network properties (MJR, MEM, DJ), pp. 357–366.
KDDKDD-2006-WangP #modelling #probability #using
Summarizing itemset patterns using probabilistic models (CW, SP), pp. 730–735.
KDDKDD-2006-XuWPWSF #using
Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
KRKR-2006-BonetG #heuristic #using
Heuristics for Planning with Penalties and Rewards using Compiled Knowledge (BB, HG), pp. 452–462.
KRKR-2006-ClassenL #knowledge-based #source code #using
Foundations for Knowledge-Based Programs using ES (JC, GL), pp. 318–328.
KRKR-2006-Rector #information management #representation
Users Are Always Right ... Even When They Are Wrong: Making Knowledge Representation Useful and Usable (ALR), p. 4.
SEKESEKE-2006-HuangC #probability #rule-based #similarity #using
Using Conditional Probability to Measure Rule-based Knowledge Similarity (CJH, MYC), pp. 41–44.
SEKESEKE-2006-HungL #data mining #mining #performance #using
Using Data Mining Schemes for Improvement on System Performance in Virtual Environments (SSH, DSML), pp. 61–66.
SEKESEKE-2006-KuleszaLAG #aspect-oriented #generative #using
Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
SEKESEKE-2006-LinWCS #case study #diagrams #modelling #process #uml
UML and Modeling A Use Case Model and its Transformation to Activity Diagram (XYL, CHW, WCC, CS), pp. 556–561.
SEKESEKE-2006-MaLL #component #design #research #testing
The Research and Design of Layered-metadata used for Component-based Software Testing (LM, YL, ML), pp. 720–723.
SEKESEKE-2006-MazzoleniVFMB #image #towards #using
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
SEKESEKE-2006-Merz #approach #java #security #using
Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
SEKESEKE-2006-MichielsRBBD #modelling #testing #using
Program Testing Using High-Level Property-Driven Models (IM, CDR, JB, EGB, TD), pp. 489–494.
SEKESEKE-2006-PauliX #case study #composition #consistency
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
SEKESEKE-2006-PilskalnsA #design #ocl #security #testing #uml #using
Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
SEKESEKE-2006-SornilS #detection #using
Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
SEKESEKE-2006-SteinmacherLH #analysis #process #simulation #using #workflow
Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKESEKE-2006-YuLSH #modelling #using
Modeling Complex Software Systems Using an Aspect Extension of Object-Z (HY, DL, ZS, XH), pp. 11–16.
SIGIRSIGIR-2006-AlonsoG #clustering #using
Clustering of search results using temporal attributes (OA, MG), pp. 597–598.
SIGIRSIGIR-2006-AnhM #evaluation #query #using
Pruned query evaluation using pre-computed impacts (VNA, AM), pp. 372–379.
SIGIRSIGIR-2006-AslamPY #evaluation #statistics #using
A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
SIGIRSIGIR-2006-DiazM #corpus #estimation #modelling #scalability #using
Improving the estimation of relevance models using large external corpora (FD, DM), pp. 154–161.
SIGIRSIGIR-2006-FernandezVC #rank #using
Using historical data to enhance rank aggregation (MF, DV, PC), pp. 643–644.
SIGIRSIGIR-2006-LiR #named #using #web
DeWild: a tool for searching the web using wild cards (HL, DR), p. 731.
SIGIRSIGIR-2006-MacdonaldO06a #framework #using
Searching for expertise using the terrier platform (CM, IO), p. 732.
SIGIRSIGIR-2006-MayfieldM #documentation #retrieval #using
Improving QA retrieval using document priors (JM, PM), pp. 677–678.
SIGIRSIGIR-2006-MinkovCN #ambiguity #email #graph #using
Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SIGIRSIGIR-2006-ParikhK #feedback #named #query #using
Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIRSIGIR-2006-RadlinskiD #personalisation #using #web
Improving personalized web search using result diversification (FR, STD), pp. 691–692.
SIGIRSIGIR-2006-RamirezWV #using #xml
Using small XML elements to support relevance (GR, TW, APdV), pp. 693–694.
SIGIRSIGIR-2006-TreeratpitukC #automation #case study #clustering #statistics #using
An experimental study on automatically labeling hierarchical clusters using statistical features (PT, JPC), pp. 707–708.
SIGIRSIGIR-2006-VaradarajanHL #using #web
Searching the web using composed pages (RV, VH, TL), pp. 713–714.
SIGIRSIGIR-2006-VassilvitskiiB #distance #feedback #using #web
Using web-graph distance for relevance feedback in web search (SV, EB), pp. 147–153.
ECMFAECMDA-FA-2006-BraheO #modelling #process #uml
Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles (SB, ), pp. 241–255.
ECMFAECMDA-FA-2006-EngelPK #model merging #using
Using a Model Merging Language for Reconciling Model Versions (KDE, RFP, DSK), pp. 143–157.
MODELSMoDELS-2006-CeriaC #case study #development
Use Case Driven Iterative Development: Hurdles and Solutions (SC, JJC), pp. 73–82.
MODELSMoDELS-2006-DuarteKU #information management #using
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk #using
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-Henderson-SellersG #uml
Uses and Abuses of the Stereotype Mechanism in UML 1.x and 2.0 (BHS, CGP), pp. 16–26.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MustafizSKV #assessment #case study #modelling
Model-Driven Assessment of Use Cases for Dependable Systems (SM, XS, JK, HV), pp. 558–573.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml #using
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
MODELSMoDELS-2006-CeriaC #case study #development
Use Case Driven Iterative Development: Hurdles and Solutions (SC, JJC), pp. 73–82.
MODELSMoDELS-2006-DuarteKU #information management #using
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk #using
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-Henderson-SellersG #uml
Uses and Abuses of the Stereotype Mechanism in UML 1.x and 2.0 (BHS, CGP), pp. 16–26.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MustafizSKV #assessment #case study #modelling
Model-Driven Assessment of Use Cases for Dependable Systems (SM, XS, JK, HV), pp. 558–573.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml #using
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
OOPSLAOOPSLA-2006-CavazosO #compilation #using
Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
OOPSLAOOPSLA-2006-FairbanksGS #design #framework #using
Design fragments make using frameworks easier (GF, DG, WLS), pp. 75–88.
OOPSLAOOPSLA-2006-Hutchins #prototype #using
Eliminating distinctions of class: using prototypes to model virtual classes (DH), pp. 1–20.
OOPSLAOOPSLA-2006-KitMB #analysis #requirements #semantics #using
Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
QAPLQAPL-2005-BinderH06 #bytecode #cpu #metric #using
Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
GPCEGPCE-2006-ApelB #aspect-oriented #case study
When to use features and aspects?: a case study (SA, DSB), pp. 59–68.
GPCEGPCE-2006-BromanNF #constraints #equation #using
Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
LOPSTRLOPSTR-2006-ArroyoRSV #graph #partial evaluation #using
Improving Offline Narrowing-Driven Partial Evaluation Using Size-Change Graphs (GA, JGR, JS, GV), pp. 60–76.
LOPSTRLOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code #using
Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
LOPSTRLOPSTR-2006-Payet #detection #term rewriting #using
Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
QAPLQAPL-2006-BinderH06a #bytecode #profiling #using #virtual machine
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
PADLPADL-2006-GouraudG #functional #java #testing #using #virtual machine
Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine (SDG, AG), pp. 1–15.
PADLPADL-2006-NavasBH #analysis #clique #performance #top-down #using
Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
PADLPADL-2006-QuesadaRDC #problem #using
Using Dominators for Solving Constrained Path Problems (LQ, PVR, YD, RC), pp. 73–87.
RERE-2006-AlencarMACSM #aspect-oriented #using
Using Aspects to Simplify iModels (FMRA, AMDM, JA, JC, CTLLS, JM), pp. 328–329.
RERE-2006-EbnenasirCK #analysis #case study #fault tolerance #modelling
Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance (AE, BHCC, SK), pp. 336–337.
RERE-2006-El-AttarM #case study #modelling #quality
Matching Antipatterns to Improve the Quality of Use Case Models (MEA, JM), pp. 96–105.
RERE-2006-Gonzalez-BaixauliLL #elicitation #interactive #non-functional #requirements #using
Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory (BGB, JCSdPL, MAL), pp. 340–341.
RERE-2006-GordijnPW #comprehension #modelling #using
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
RERE-2006-KaiyaS #elicitation #ontology #requirements #using
Using Domain Ontology as Domain Knowledge for Requirements Elicitation (HK, MS), pp. 186–195.
RERE-2006-MaidenSGOM #mobile #requirements #tool support
Making Mobile Requirements Engineering Tools Usable and Useful (NAMM, NS, PG, OO, KM), pp. 26–35.
RERE-2006-TangL #case study #modelling
Improving the Modeling of Use Case Relationship (JT, DL), pp. 348–351.
RERE-2006-TormerIP #assessment #case study #empirical #quality
An Empirical Quality Assessment of Automotive Use Cases (FT, MI, FP, ), pp. 86–95.
RERE-2006-WhittleJ #case study #generative #state machine
Generating Hierarchical State Machines from Use Case Charts (JW, PKJ), pp. 16–25.
SACSAC-2006-AlmeidaG #algorithm #database #incremental #nearest neighbour #network #using
Using Dijkstra’s algorithm to incrementally find the k-Nearest Neighbors in spatial network databases (VTdA, RHG), pp. 58–62.
SACSAC-2006-AltLM #linear #on the #probability #problem #using
On the numerical solution to linear problems using stochastic arithmetic (RA, JLL, SM), pp. 1635–1639.
SACSAC-2006-Bellur #consistency #object-oriented #on the #using #workflow
On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
SACSAC-2006-BernsteinK #ontology #retrieval #similarity #towards #using
Imprecise RDQL: towards generic retrieval in ontologies using similarity joins (AB, CK), pp. 1684–1689.
SACSAC-2006-BonnetEV #ad hoc #mobile #network #using
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts (FB, PDE, EV), pp. 670–674.
SACSAC-2006-ChongL #using
An extension of dead end elimination for protein side-chain conformation using merge-decoupling (KFC, HWL), pp. 195–199.
SACSAC-2006-CraigL #classification #learning #using
Protein classification using transductive learning on phylogenetic profiles (RAC, LL), pp. 161–166.
SACSAC-2006-CutelloNP #algorithm #hybrid #optimisation #using
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
SACSAC-2006-DinechinLM #using #verification
Assisted verification of elementary functions using Gappa (FdD, CQL, GM), pp. 1318–1322.
SACSAC-2006-GuoW #data mining #mining #on the #privacy
On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SACSAC-2006-JacquenetL #documentation #using
Using the structure of documents to improve the discovery of unexpected information (FJ, CL), pp. 1036–1042.
SACSAC-2006-JenkinsM #algorithm #development
GIS, SINKS, FILL, and disappearing wetlands: unintended consequences in algorithm development and use (DGJ, LAM), pp. 277–282.
SACSAC-2006-KacemKJD #architecture #uml #using
Describing dynamic software architectures using an extended UML model (MHK, AHK, MJ, KD), pp. 1245–1249.
SACSAC-2006-KatsimpaPSTT #modelling #reverse engineering #using
Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
SACSAC-2006-KramerMH #case study #elicitation #mobile #using
Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set #using
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-SauvagnatHB #question #retrieval #using #what #xml
XML retrieval: what about using contextual relevance? (KS, LH, MB), pp. 1114–1115.
SACSAC-2006-ShapiraTM
Study of the usefulness of known and new implicit indicators and their optimal combination for accurate inference of users interests (BS, MTM, AM), pp. 1118–1119.
SACSAC-2006-SharminAA #adaptation #middleware #resource management #self #usability #using
Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) (MS, SA, SIA), pp. 1013–1017.
SACSAC-2006-SinghXMH #geometry #linear #locality #problem #programming #using
Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
SACSAC-2006-SoaresB #kernel #parametricity #using
Selecting parameters of SVM using meta-learning and kernel matrix-based meta-features (CS, PB), pp. 564–568.
SACSAC-2006-SzlavikTL #interactive #retrieval #summary #xml
Investigating the use of summarisation for interactive XML retrieval (ZS, AT, ML), pp. 1068–1072.
SACSAC-2006-WuBGRM #compilation #development #using
Separation of concerns in compiler development using aspect-orientation (XW, BRB, JGG, SR, MM), pp. 1585–1590.
SACSAC-2006-YuJV #kernel #privacy #using
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
SACSAC-2006-ZhouAL #database #image #interactive #retrieval #similarity #using
Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph (XMZ, CHA, TWL), pp. 46–51.
FSEFSE-2006-GirouxR #detection #testing #using
Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
FSEFSE-2006-HackettA #alias #how #question
How is aliasing used in systems software? (BH, AA), pp. 69–80.
FSEFSE-2006-HalfondOM #evaluation #injection #sql #using
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
FSEFSE-2006-KerstenM #using
Using task context to improve programmer productivity (MK, GCM), pp. 1–11.
FSEFSE-2006-StorzerRRT #classification #java #source code #using
Finding failure-inducing changes in java programs using change classification (MS, BGR, XR, FT), pp. 57–68.
ICSEICSE-2006-AbeMKKH #classification #estimation #using
Estimation of project success using Bayesian classifier (SA, OM, TK, NK, MH), pp. 600–603.
ICSEICSE-2006-Dolins #process #using
Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code #using
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-HalfondO #injection #sql #using
Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
ICSEICSE-2006-JiamthubthugsinS #development #using
Portfolio management of software development projects using COCOMO II (WJ, DS), pp. 889–892.
ICSEICSE-2006-KrugerMM #architecture #aspect-oriented #performance #using
Efficient exploration of service-oriented architectures using aspects (IHK, RM, MM), pp. 62–71.
ICSEICSE-2006-NakamichiSSM #behaviour #detection #usability #using #web
Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
ICSEICSE-2006-RundleD #agile #using
Using return on investment to compare agile and plan-driven practices in undergraduate group projects (PJR, RGD), pp. 649–654.
ICSEICSE-2006-Sindhgatta #information retrieval #source code #using
Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSEICSE-2006-YangBC #estimation #integration #off the shelf #using
Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
ICSEICSE-2006-ZouZ #automation #e-commerce #evolution #framework #generative #process #using
A framework for automatic generation of evolvable e-commerce workplaces using business processes (YZ, QZ), pp. 799–802.
LDTALDTA-2006-LiSWKM #modelling
Analyzing the Uses of a Software Modeling Tool (XL, DS, JW, SK, DM), pp. 3–18.
SPLCSPL-BOOK-2006-BertolinoFGL #case study #product line #requirements #specification #testing
Product Line Use Cases: Scenario-Based Specification and Testing of Requirements (AB, AF, SG, GL), pp. 425–445.
SPLCSPL-BOOK-2006-Engelsma #diagrams #evolution #incremental #integration #multi #product line #using
Incremental Systems Integration within Multidisciplinary Product Line Engineering Using Configuration Item Evolution Diagrams (EE), pp. 523–555.
SPLCSPLC-2006-BragancaM #case study #metamodelling #specification #uml #variability
Extending UML 2.0 Metamodel for Complementary Usages of the «extend» Relationship within Use Case Variability Specification (AB, RJM), pp. 123–130.
SPLCSPLC-2006-Gomaa #architecture #case study #design #product line #uml
Designing Software Product Lines with UML 2.0: From Use Cases to Pattern-Based Software Architectures (HG), p. 218.
SPLCSPLC-2006-HallsteinsenSSF #adaptation #product line #using
Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
SPLCSPLC-2006-SpinczykP #feature model #modelling #using
Using Feature Models for Product Derivation (OS, HP), p. 225.
SPLCSPLC-2006-TraskRPB #component #modelling #product line #using
Using Model-Driven Engineering to Complement Software Product Line Engineering in Developing Software Defined Radio Components and Applications (BT, AR, DP, VB), pp. 192–202.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #identification #named #using
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASPLOSASPLOS-2006-KgilDSBDMRF #3d #energy #multi #named #performance #using
PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessor (TK, SD, AGS, NLB, RGD, TNM, SKR, KF), pp. 117–128.
ASPLOSASPLOS-2006-NarayanasamyPC #dependence #memory management #using
Recording shared memory dependencies using strata (SN, CP, BC), pp. 229–240.
ASPLOSASPLOS-2006-TarditiPO #named #parallel #using
Accelerator: using data parallelism to program GPUs for general-purpose uses (DT, SP, JO), pp. 325–335.
CCCC-2006-CavazosMO #algorithm #hybrid #optimisation #question
Hybrid Optimizations: Which Optimization Algorithm to Use? (JC, JEBM, MFPO), pp. 124–138.
CCCC-2006-DiasR #assembly #declarative #using
Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
CCCC-2006-Necula #dependent type #low level #type system #using
Using Dependent Types to Port Type Systems to Low-Level Languages (GCN), p. 1.
CGOCGO-2006-AgakovBCFFOTTW #machine learning #optimisation #using
Using Machine Learning to Focus Iterative Optimization (FVA, EVB, JC, BF, GF, MFPO, JT, MT, CKIW), pp. 295–305.
CGOCGO-2006-NandaLLC #named #runtime #using
BIRD: Binary Interpretation using Runtime Disassembly (SN, WL, LCL, TcC), pp. 358–370.
HPCAHPCA-2006-JosephVT #analysis #linear #modelling #performance
Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
HPDCHPDC-2006-AliL #performance #using
Improving the Performance of Remote I/O Using Asynchronous Primitives (NA, ML), pp. 218–228.
HPDCHPDC-2006-ChungH #automation #case study #performance #scalability #source code #using
A Case Study Using Automatic Performance Tuning for Large-Scale Scientific Programs (IHC, JKH), pp. 45–56.
HPDCHPDC-2006-SandholmLOO #grid #performance #predict #resource management #using
Market-Based Resource Allocation using Price Prediction in a High Performance Computing Grid for Scientific Applications (TS, KL, JAO, JO), pp. 132–143.
HPDCHPDC-2006-YehAWCT #performance #using
Using File Grouping to Improve the Disk Performance (Extended Abstract) (TY, JA, JSW, IFC, KHT), pp. 365–366.
LCTESLCTES-2006-KreahlingHWT #comparison #cost analysis #specification #using
Reducing the cost of conditional transfers of control by using comparison specifications (WCK, SH, DBW, GST), pp. 64–71.
OSDIOSDI-2006-ZhouCABEHNB #named #using
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques (FZ, JC, ZRA, IB, RE, MH, GCN, EAB), pp. 45–60.
AMOSTAMOST-J-2005-Robinson-MallettLMG06 #identification #model checking #using #verification
Extended state identification and verification using a model checker (CRM, PL, TM, UG), pp. 981–992.
CAVCAV-2006-JainIGSW #abstraction #invariant #refinement #using
Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop (HJ, FI, AG, IS, CW), pp. 137–151.
CAVCAV-2006-KahlonGS #concurrent #model checking #on the fly #partial order #source code #transaction #using
Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions (VK, AG, NS), pp. 286–299.
FATESFATES-RV-2006-ElmasQT #named #using
Goldilocks: Efficiently Computing the Happens-Before Relation Using Locksets (TE, SQ, ST), pp. 193–208.
FATESFATES-RV-2006-ErnitsKRV #generative #model checking #modelling #refinement #testing #using
Generating Tests from EFSM Models Using Guided Model Checking and Iterated Search Refinement (JPE, AK, KR, JV), pp. 85–99.
ICLPICLP-2006-BaralDT #composition #metaprogramming #set
Macros, Macro Calls and Use of Ensembles in Modular Answer Set Programming (CB, JD, HT), pp. 376–390.
ICLPICLP-2006-Brain #declarative #problem #semantics #set #using
Declarative Problem Solving Using Answer Set Semantics (MB), pp. 459–460.
ICLPICLP-2006-CabalarOPV #equilibrium #logic #semantics #using
Analysing and Extending Well-Founded and Partial Stable Semantics Using Partial Equilibrium Logic (PC, SPO, DP, AV), pp. 346–360.
ICLPICLP-2006-Lam #datalog #question #source code #why
Why Use Datalog to Analyze Programs? (MSL), p. 1.
ICLPICLP-2006-MeraLPCH #estimation #execution #logic programming #profiling #static analysis #using
Using Combined Static Analysis and Profiling for Logic Program Execution Time Estimation (EM, PLG, GP, MC, MVH), pp. 431–432.
ICLPICLP-2006-OrtizV #combinator #logic #natural language #using
Natural Language Processing Using Lexical and Logical Combinators (JFO, JV), pp. 444–446.
ICLPICLP-2006-QuintanoR #database #framework #logic programming #natural language #query #using
Using a Logic Programming Framework to Control Database Query Dialogues in Natural Language (LQ, IPR), pp. 406–420.
ICLPICLP-2006-RamakrishnanRW #deduction #logic programming #spreadsheet #using
Deductive Spreadsheets Using Tabled Logic Programming (CRR, IVR, DSW), pp. 391–405.
ICLPICLP-2006-SchwaigerF #assessment #automation #compilation #programming #testing #using
Using Answer Set Programming for the Automatic Compilation of Assessment Tests (PS, BF), pp. 300–314.
IJCARIJCAR-2006-SutcliffeSCG #finite #using
Using the TPTP Language for Writing Derivations and Finite Interpretations (GS, SS, KC, AVG), pp. 67–81.
ISSTAISSTA-2006-KiviluomaKM #architecture #aspect-oriented #behaviour #monitoring #runtime #using
Run-time monitoring of architecturally significant behaviors using behavioral profiles and aspects (KK, JK, TM), pp. 181–190.
ISSTAISSTA-2006-SiegelMAC #execution #model checking #parallel #source code #symbolic computation #using #verification
Using model checking with symbolic execution to verify parallel numerical programs (SFS, AM, GSA, LAC), pp. 157–168.
ISSTAISSTA-2006-VisserPP #generative #java #using
Test input generation for java containers using state matching (WV, CSP, RP), pp. 37–48.
LICSLICS-2006-BarthM #linear #logic #using
Managing Digital Rights using Linear Logic (AB, JCM), pp. 127–136.
LICSLICS-2006-Bryant #infinity #using #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 3–4.
LICSLICS-2006-CoquandS #normalisation #proving #using
A Proof of Strong Normalisation using Domain Theory (TC, AS), pp. 307–316.
MBTMBT-2006-KervinenMK #architecture #testing #using
Controlling Testing Using Three-Tier Model Architecture (AK, MM, MK), pp. 53–66.
RTARTA-2006-Bruggink #finite #higher-order #product line #proving #using
A Proof of Finite Family Developments for Higher-Order Rewriting Using a Prefix Property (HJSB), pp. 372–386.
RTARTA-2006-Bryant #infinity #using #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
ICSTSAT-2006-JainBC #satisfiability #using
Satisfiability Checking of Non-clausal Formulas Using General Matings (HJ, CB, EMC), pp. 75–89.
ICSTSAT-2006-NishimuraRS #satisfiability #using
Solving #SAT Using Vertex Covers (NN, PR, SS), pp. 396–409.
ICTSSTestCom-2006-BerradaCFS #bound #realtime #testing #using
Test Case Minimization for Real-Time Systems Using Timed Bound Traces (IB, RC, PF, AS), pp. 289–305.
ICTSSTestCom-2006-KeumKKBC #finite #generative #state machine #testing #using #web #web service
Generating Test Cases for Web Services Using Extended Finite State Machine (CK, SK, IYK, JB, YIC), pp. 103–117.
ICTSSTestCom-2006-Nyberg #testing
Use of TTCN-3 for Software Module Testing (AJN), pp. 161–176.
ICTSSTestCom-2006-WangWYST #communication #realtime #testing #using
Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems (ZW, JW, XY, XS, BT), pp. 324–340.
ICTSSTestCom-2006-YalcinY #sequence #using
Using Distinguishing and UIO Sequences Together in a Checking Sequence (MCY, HY), pp. 259–273.
CBSECBSE-2005-CooperCLSSW #component #empirical #fuzzy #logic #specification #using
An Empirical Study on the Specification and Selection of Components Using Fuzzy Logic (KMLC, JWC, RL, GS, RS, WEW), pp. 155–170.
CBSECBSE-2005-LiuG #performance #predict #protocol #using
Performance Prediction of J2EE Applications Using Messaging Protocols (YL, IG), pp. 1–16.
WICSAWICSA-2005-SmedaOK #uml #using
Mapping ADLs into UML 2.0 Using a Meta ADL (AS, MO, TK), pp. 247–248.
WICSAWICSA-2005-TangBGH #architecture #bibliography #design #documentation
A Survey of the Use and Documentation of Architecture Design Rationale (AT, MAB, IG, JH), pp. 89–98.
WICSAWICSA-2005-TekinerdoganSA #analysis #architecture #reliability #using
Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
WICSAWICSA-2005-WoodsR #architecture #using
Using Architectural Perspectives (EW, NR), pp. 25–35.
WICSAWICSA-2005-ZhuLGB #benchmark #generative #metric #using
Customized Benchmark Generation Using MDA (LZ, YL, IG, NBB), pp. 35–44.
ASEASE-2005-AgarwalSWS #concurrent #detection #runtime #using
Optimized run-time race detection and atomicity checking using partial discovered types (RA, AS, LW, SDS), pp. 233–242.
ASEASE-2005-CoppitL #generative #named #testing
yagg: an easy-to-use generator for structured test inputs (DC, JL), pp. 356–359.
ASEASE-2005-DiaconescuM #automation #component #enterprise #performance
Automating the performance management of component-based enterprise systems through the use of redundancy (AD, JM), pp. 44–53.
ASEASE-2005-ErikssonMBB #case study #modelling #product line #tool support
The PLUSS toolkit — extending telelogic DOORS and IBM-rational rose to support product line use case modeling (ME, HM, JB, KB), pp. 300–304.
ASEASE-2005-FalbPRJAK #automation #specification #synthesis #user interface #using
Using communicative acts in high-level specifications of user interfaces for their automated synthesis (JF, RP, TR, HJ, EA, HK), pp. 429–430.
ASEASE-2005-GuptaHZG #using
Locating faulty code using failure-inducing chops (NG, HH, XZ, RG), pp. 263–272.
ASEASE-2005-VisserPP #abstraction #generative #using
Test input generation for red-black trees using abstraction (WV, CSP, RP), pp. 414–417.
CASECASE-2005-CengicALYF #composition #implementation #using
Implementation of full synchronous composition using IEC 61499 function blocks (GC, , BL, CY, PMF), pp. 267–272.
CASECASE-2005-ChangLJ #detection #fault #network #using
Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
CASECASE-2005-ChengY #bound #using
Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
CASECASE-2005-FalkmanLT #algebra #petri net #process #specification #using
Specification of a batch plant using process algebra and Petri nets (PF, BL, MT), pp. 339–344.
CASECASE-2005-FigueiredoJ #using
Nonholonomic systems stabilization and tracking control using discontinuous control (LCF, FGJ), pp. 142–147.
CASECASE-2005-JainR #analysis #modelling #using
Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
CASECASE-2005-KimD #metric #process #quality #using
Quality measurement of production process plan using tolerance chart (IHK, ZD), pp. 25–30.
CASECASE-2005-KimKYT #identification #realtime #using
Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
CASECASE-2005-LiuHL #flexibility #scheduling #using
Dynamic scheduling of flexible manufacturing system using support vector machines (YHL, HPH, YSL), pp. 387–392.
CASECASE-2005-LowWW #development #on the #realtime #using
On the development of a real time control system by using xPC Target: solution to robotic system control (KHL, HW, MYW), pp. 345–350.
CASECASE-2005-MillerSSLM #analysis #using
Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
CASECASE-2005-SchmidW #using
Path planning for a humanoid using NURBS curves (AJS, HW), pp. 351–356.
CASECASE-2005-SongHQG #automation #documentation #using
Automating inspection and documentation of remote building construction using a robotic camera (DS, QH, NQ, KG), pp. 172–177.
CASECASE-2005-TanonkouBBX #approach #probability #problem #using
Solving a stochastic inventory-location problem using Lagrangian relaxation approach (GAT, LB, RB, XX), pp. 279–284.
CASECASE-2005-WangCL #capacity #robust #using
Using shared resource capacity for robust control of failure prone manufacturing systems (SW, SFC, MAL), pp. 369–374.
CASECASE-2005-WangLWK #architecture #distributed #simulation #using
Collision resolution simulation for distributed control architectures using LonWorks (MW, EL, EW, MK), pp. 319–326.
CASECASE-2005-WeiL #concurrent #policy #programming #using
A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
DACDAC-2005-AgarwalCBZ #analysis #optimisation #statistics #using
Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
DACDAC-2005-AminID #approximate #using
Piece-wise approximations of RLCK circuit responses using moment matching (CSA, YII, FD), pp. 927–932.
DACDAC-2005-BhuniaBCMR #approach #novel #power management #reduction #synthesis #using
A novel synthesis approach for active leakage power reduction using dynamic supply gating (SB, NB, QC, HMM, KR), pp. 479–484.
DACDAC-2005-HuLWD #analysis #integration #novel #using
Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
DACDAC-2005-KimYH #using
Trace-driven HW/SW cosimulation using virtual synchronization technique (DK, YY, SH), pp. 345–348.
DACDAC-2005-LuoYYB #design #network #power management #using
Low power network processor design using clock gating (YL, JY, JY, LNB), pp. 712–715.
DACDAC-2005-MitraYP #named #performance #simulation #using
RADAR: RET-aware detailed routing using fast lithography simulations (JM, PY, DZP), pp. 369–372.
DACDAC-2005-NookalaCLS #approach #architecture #design #statistics #using
Microarchitecture-aware floorplanning using a statistical design of experiments approach (VN, YC, DJL, SSS), pp. 579–584.
DACDAC-2005-PengL #named #performance #power management #using
Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method (YP, XL), pp. 813–818.
DACDAC-2005-VolkerinkM #architecture #using
Response compaction with any number of unknowns using a new LFSR architecture (EHV, SM), pp. 117–122.
DACDAC-2005-ZhangPHS #abstraction #satisfiability #using
Dynamic abstraction using SAT-based BMC (LZ, MRP, MSH, TS), pp. 754–757.
DATEDATE-2005-AgarwalCB #optimisation #statistics #using
Statistical Timing Based Optimization using Gate Sizing (AA, KC, DB), pp. 400–405.
DATEDATE-2005-BalakrishnanT #configuration management #linear #using
Reconfigurable Linear Decompressors Using Symbolic Gaussian Elimination (KJB, NAT), pp. 1130–1135.
DATEDATE-2005-EeckelaertMG #multi #performance #synthesis #using
Efficient Multiobjective Synthesis of Analog Circuits using Hierarchical Pareto-Optimal Performance Hypersurfaces (TE, TM, GGEG), pp. 1070–1075.
DATEDATE-2005-GadkariR #automation #monitoring #specification #synthesis #using #visual notation
Automated Synthesis of Assertion Monitors using Visual Specifications (AAG, SR), pp. 390–395.
DATEDATE-2005-GanaiGA #embedded #memory management #modelling #performance #using #verification
Verification of Embedded Memory Systems using Efficient Memory Modeling (MKG, AG, PA), pp. 1096–1101.
DATEDATE-2005-HanlaiMJ #control flow #graph #memory management #optimisation #performance #using
Extended Control Flow Graph Based Performance Optimization Using Scratch-Pad Memory (PH, LM, JJ), pp. 828–829.
DATEDATE-2005-JeffreyCPLRR #configuration management #integration #monitoring #online #safety #using
The Integration of On-Line Monitoring and Reconfiguration Functions using IEEE1149.4 Into a Safety Critical Automotive Electronic Control Unit (CJ, RC, SP, ML, AR, SR), pp. 153–158.
DATEDATE-2005-KangPR #analysis #statistics #using
Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
DATEDATE-2005-KeezerGMT #low cost #multi #using
Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL (DCK, CG, AMM, NT), pp. 152–157.
DATEDATE-2005-LiLLPN #modelling #order #parametricity #performance #reduction #using #variability
Modeling Interconnect Variability Using Efficient Parametric Model Order Reduction (PL, FL, XL, LTP, SRN), pp. 958–963.
DATEDATE-2005-LyseckyV #case study #clustering #hardware #using
A Study of the Speedups and Competitiveness of FPGA Soft Processor Cores using Dynamic Hardware/Software Partitioning (RLL, FV), pp. 18–23.
DATEDATE-2005-MartensG #integration #orthogonal #polynomial #simulation #using
Time-Domain Simulation of Sampled Weakly Nonlinear Systems Using Analytical Integration and Orthogonal Polynomial Series (EM, GGEG), pp. 120–125.
DATEDATE-2005-MaslovYMD #quantum #using
Quantum Circuit Simplification Using Templates (DM, CY, DMM, GWD), pp. 1208–1213.
DATEDATE-2005-MishchenkoBJVY #equation #performance #using
Efficient Solution of Language Equations Using Partitioned Representations (AM, RKB, JHRJ, TV, NY), pp. 418–423.
DATEDATE-2005-NaculG #compilation #embedded #lightweight #multi #using
Lightweight Multitasking Support for Embedded Systems using the Phantom Serializing Compiler (ACN, TG), pp. 742–747.
DATEDATE-2005-NegreirosCS #evaluation #low cost #using
Noise Figure Evaluation Using Low Cost BIST (MN, LC, AAS), pp. 158–163.
DATEDATE-2005-NeiroukhS #statistics #using
Improving the Process-Variation Tolerance of Digital Circuits Using Gate Sizing and Statistical Techniques (ON, XS), pp. 294–299.
DATEDATE-2005-OgrasM #approach #architecture #communication #composition #energy #synthesis #using
Energy- and Performance-Driven NoC Communication Architecture Synthesis Using a Decomposition Approach (ÜYO, RM), pp. 352–357.
DATEDATE-2005-SuCP #configuration management #using
Yield Enhancement of Digital Microfluidics-Based Biochips Using Space Redundancy and Local Reconfiguration (FS, KC, VKP), pp. 1196–1201.
DATEDATE-2005-Takeuchi #debugging #lightweight #monitoring #using #virtual machine
OS Debugging Method Using a Lightweight Virtual Machine Monitor (TT), pp. 1058–1059.
DATEDATE-2005-VargheseCY #analysis #using
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
DATEDATE-2005-YangHSP #logic #multi #quantum #synthesis #using
Exact Synthesis of 3-Qubit Quantum Circuits from Non-Binary Quantum Gates Using Multiple-Valued Logic and Group Theory (GY, WNNH, XS, MAP), pp. 434–435.
DocEngDocEng-2005-MacdonaldBB #component #encapsulation #using
Encapsulating and manipulating component object graphics (COGs) using SVG (AJM, DFB, SRB), pp. 61–63.
DocEngDocEng-2005-ThomasB #documentation #using #xml
Enhancing composite digital documents using XML-based standoff markup (PLT, DFB), pp. 177–186.
DRRDRR-2005-MaD #identification #using
Font identification using the grating cell texture operator (HM, DSD), pp. 148–156.
DRRDRR-2005-OertelOBB #documentation #recognition #using #validation #web
Using the web to validate document recognition results: experiments with business cards (CO, SO, AB, DB), pp. 17–27.
DRRDRR-2005-ShiG #documentation #image #normalisation #segmentation #using
Historical document image segmentation using background light intensity normalization (ZS, VG), pp. 167–174.
DRRDRR-2005-TaghvaCPN #markov #modelling #using
Address extraction using hidden Markov models (KT, JSC, RP, TAN), pp. 119–126.
HTHT-2005-BerlangaG #adaptation #design #learning #modelling #navigation #specification #using
Modelling adaptive navigation support techniques using the IMS learning design specification (AJB, FJG), pp. 148–150.
HTHT-2005-BhagwatP #file system #semantics #using
Searching a file system using inferred semantic links (DB, NP), pp. 85–87.
HTHT-2005-MantratzisOC #analysis #html #navigation #using
Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
ICDARICDAR-2005-AlonAS #online #prototype #recognition #using
Online and Offline Character Recognition Using Alignment to Prototypes (JA, VA, SS), pp. 839–845.
ICDARICDAR-2005-BaiH #case study #online #recognition
A Study On the Use of 8-Directional Features For Online Handwritten Chinese Character Recognition (ZLB, QH), pp. 262–266.
ICDARICDAR-2005-BarbuHAT #clustering #documentation #image #representation #using
Clustering document images using a bag of symbols representation (EB, PH, SA, ÉT), pp. 1216–1220.
ICDARICDAR-2005-BeheraLI #documentation #geometry #identification #using
Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution (AB, DL, RI), pp. 468–472.
ICDARICDAR-2005-BhagvatiD #classification #using
Classification of Liquid and Viscous Inks using HSV Colour Space (CB, HD), pp. 660–664.
ICDARICDAR-2005-ChengB #heuristic #segmentation #using #word
The Neural-based Segmentation of Cursive Words using Enhanced Heuristics (CKC, MB), pp. 650–654.
ICDARICDAR-2005-ChenS #verification
Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
ICDARICDAR-2005-DrakeB #geometry #using
Distinguishing Mathematics Notation from English Text using Computational Geometry (DMD, HSB), pp. 1270–1274.
ICDARICDAR-2005-El-HajjLM #markov #modelling #recognition #using
Arabic Handwriting Recognition Using Baseline Dependant Features and Hidden Markov Modeling (REH, LLS, CM), pp. 893–897.
ICDARICDAR-2005-HadjarI #logic #using
Logical Labeling of Arabic Newspapers using Artificial Neural Nets (KH, RI), pp. 426–431.
ICDARICDAR-2005-HandleyNZ #comprehension #context-free grammar #documentation #probability #using
Document Understanding System Using Stochastic Context-Free Grammars (JCH, AMN, RZ), pp. 511–515.
ICDARICDAR-2005-HtweHLY #network #online
Transliteration of Online Handwritten Phonetic Pitman’s Shorthand with the Use of a Bayesian Network (SMH, CH, GL, MY), pp. 1090–1094.
ICDARICDAR-2005-KeyesSW #modelling #recognition #statistics #using #visual notation
Graphical Object Recognition using Statistical Language Models (LK, AO, ACW), pp. 1095–1099.
ICDARICDAR-2005-KimPK #image #using
Text Locating from Natural Scene Images Using Image Intensitie (JSK, SCP, SHK), pp. 655–659.
ICDARICDAR-2005-KumarKCJ #image #using
Locating Text in Images using Matched Wavelets (SK, NK, SC, SDJ), pp. 595–599.
ICDARICDAR-2005-LamH #data type #performance #using
A Data Structure Using Hashing and Tries For Efficient Chinese Lexical Access (YKL, QH), pp. 506–510.
ICDARICDAR-2005-LeeKO #documentation #image #retrieval #using
Hangul Document Image Retrieval System Using Rank-based Recognitio (DRL, WYK, ISO), pp. 615–619.
ICDARICDAR-2005-LiuCL #identification #image #machine learning #using
Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
ICDARICDAR-2005-LiuD #classification #multi #polynomial #recognition #using
Handwritten Character Recognition Using Gradient Feature and Quadratic Classifier with Multiple Discrimination Schemes (HL, XD), pp. 19–25.
ICDARICDAR-2005-LiuMK #classification #feature model #recognition #scalability #set #using
Building Compact Classifier for Large Character Set Recognition Using Discriminative Feature Extraction (CLL, RM, MK), pp. 846–850.
ICDARICDAR-2005-MouchereAR #adaptation #fuzzy #online #recognition #using
On-line Writer Adaptation for Handwriting Recognition using Fuzzy Inference Systems (HM, ÉA, NR), p. 1075.
ICDARICDAR-2005-MoussaZAB #classification
Can Fractal Dimension Be Used In Font Classification (SBM, AZ, AMA, AB), pp. 146–150.
ICDARICDAR-2005-MozaffariFZ #encoding #recognition #representation #using
Character Representation and Recognition Using Quadtree-based Fractal Encoding Scheme (SM, KF, MZ), pp. 819–823.
ICDARICDAR-2005-NelPH #markov #modelling #multi #using
Estimating the Pen Trajectories of Multi-Path Static Scripts Using Hidden Markov Models (EMN, JAdP, BMH), pp. 41–47.
ICDARICDAR-2005-NicolasKPH #documentation #markov #random #segmentation #using
Handwritten Document Segmentation Using Hidden Markov Random Fields (SN, YK, TP, LH), pp. 212–216.
ICDARICDAR-2005-OjimaKW #algorithm #search-based #using
Determining Optimal Filters for Binarization of Degraded Grayscale Characters Using Genetic Algorithms (YO, SK, TW), pp. 555–559.
ICDARICDAR-2005-PanSB #identification #using
Script Identification Using Steerable Gabor Filters (WP, CYS, TDB), pp. 883–887.
ICDARICDAR-2005-RussellHBHM #using #verification
Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
ICDARICDAR-2005-RusuG #algorithm #interactive #proving #recognition #using
A Human Interactive Proof Algorithm Using Handwriting Recognition (AIR, VG), pp. 967–971.
ICDARICDAR-2005-ShiSG #adaptation #documentation #image #using
Text Extraction from Gray Scale Historical Document Images Using Adaptive Local Connectivity Map (ZS, SS, VG), pp. 794–798.
ICDARICDAR-2005-ShivakumaraKVRN #documentation #estimation #image #using #word
A New Moments based Skew Estimation Technique using Pixels in the Word for Binary Document Images (PS, GHK, HSV, SR, MRRN), pp. 151–156.
ICDARICDAR-2005-SteinkrauSB #algorithm #machine learning #using
Using GPUs for Machine Learning Algorithms (DS, PYS, IB), pp. 1115–1119.
ICDARICDAR-2005-SunHKN #recognition #using
Camera based Degraded Text Recognition Using Grayscale Feature (JS, YH, YK, SN), pp. 182–186.
ICDARICDAR-2005-UlgesLB #documentation #estimation #image #robust #using
Document Image Dewarping using Robust Estimation of Curled Text Lines (AU, CHL, TMB), pp. 1001–1005.
ICDARICDAR-2005-WangC #classification #using
A Hierarchical Classifier Using New Support Vector Machine (YCFW, DC), pp. 851–855.
ICDARICDAR-2005-YinLH #documentation #image #using
Financial Document Image Coding with Regions of Interest Using JPEG2000 (XCY, CPL, ZH), pp. 96–100.
ICDARICDAR-2005-YokobayashiW #correlation #image #recognition #segmentation #using
Segmentation and Recognition of Characters in Scene Images Using Selective Binarization in Color Space and GAT Correlation (MY, TW), pp. 167–171.
ICDARICDAR-2005-YoonCCT #profiling #using
Writer Profiling Using Handwriting Copybook Styles (SY, SSC, SHC, CCT), p. 600.
ICDARICDAR-2005-YosefBKD #image #using
Extraction of Specified Objects from Binary Images Using Object Based Erosion Transform: Application to Hebrew Calligraphic Manuscripts (IBY, IB, KK, ID), pp. 878–882.
ICDARICDAR-2005-ZaidiRM #design #hardware #online #recognition #using
Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform (RZ, SR, MY), pp. 91–95.
ICDARICDAR-2005-ZhangBZ #fuzzy #logic #using
Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions (LZ, DB, RZ), pp. 972–976.
ICDARICDAR-2005-ZhouS #approach #fault #recognition #using
Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach (JZ, CYS), pp. 484–488.
SIGMODSIGMOD-2005-BoulosDMMRS #named #using
MYSTIQ: a system for finding more answers by using probabilities (JB, NND, BM, SM, CR, DS), pp. 891–893.
SIGMODSIGMOD-2005-ChenLL #on the #pattern matching #using #xml
On Boosting Holism in XML Twig Pattern Matching using Structural Indexing Techniques (TC, JL, TWL), pp. 455–466.
SIGMODSIGMOD-2005-GovindarajuRM #approximate #mining #performance #using
Fast and Approximate Stream Mining of Quantiles and Frequencies Using Graphics Processors (NKG, NR, DM), pp. 611–622.
SIGMODSIGMOD-2005-Sedlar #case study #xml
Managing structure in bits & pieces: the killer use case for XML (ES), pp. 818–821.
VLDBVLDB-2005-AugstenBG #approximate #using
Approximate Matching of Hierarchical Data Using pq-Grams (NA, MHB, JG), pp. 301–312.
VLDBVLDB-2005-HuSCS #data type #using
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype (YH, SS, TC, JS), pp. 1140–1151.
VLDBVLDB-2005-MeierWAS #classification #fuzzy #query #using
Using a Fuzzy Classification Query Language for Customer Relationship Management (AM, NW, MA, MS), pp. 1089–1096.
VLDBVLDB-2005-MetwallyAA #detection #network #using #web
Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
VLDBVLDB-2005-Olstad #database #query #why
Why Search Engines are Used Increasingly to Offload Queries from Databases (BO), p. 1.
VLDBVLDB-2005-SayyadianLDR #using
Tuning Schema Matching Software using Synthetic Scenarios (MS, YL, AD, AR), pp. 994–1005.
VLDBVLDB-2005-WangWLJLL #performance #query #using #xml
Efficient Processing of XML Path Queries Using the Disk-based F&B Index (WW, HW, HL, HJ, XL, JL), pp. 145–156.
VLDBVLDB-2005-XuO #query #using #xpath
Rewriting XPath Queries Using Materialized Views (WX, ZMÖ), pp. 121–132.
CSEETCSEET-2005-DutoitWPBR #education #re-engineering #using
Using Rationale for Software Engineering Education (AHD, TW, BP, LB, JR), pp. 129–136.
CSEETCSEET-2005-Liu #communication #issue tracking #learning #re-engineering #student #tool support #using
Using Issue Tracking Tools to Facilitate Student Learning of Communication Skills in Software Engineering Courses (CL), pp. 61–68.
CSEETCSEET-2005-PavlovY #education #object-oriented #uml #using
Using Pantomime in Teaching OOA&OOD with UML (VLP, AY), pp. 77–84.
CSEETCSEET-2005-WangS #analysis #architecture #student #using
Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
ITiCSEITiCSE-2005-BassL #education #using
Teaching to analyze solutions using FGA (IB, DL), p. 360.
ITiCSEITiCSE-2005-Guimaraes #database #dot-net #framework #using
Constructing database applications for PDA using the .NET framework (MG), p. 417.
ITiCSEITiCSE-2005-HoodH #concept #education #programming #using
Teaching programming and language concepts using LEGOs (CSH, DJH), pp. 19–23.
ITiCSEITiCSE-2005-Impagliazzo05a
Use a little history (JI), p. 379.
ITiCSEITiCSE-2005-MaiaMP #education #framework #operating system #using
A constructivist framework for operating systems education: a pedagogic proposal using the SOsim (LPM, FBM, ACPJ), pp. 218–222.
ITiCSEITiCSE-2005-MarquesAMC #programming #student #using
Using Octave to introduce programming to technical science students (NCM, FA, CM, JFC), pp. 198–202.
ITiCSEITiCSE-2005-MedeirosDGM #programming #using
Using a PC simulator to illustrate input-output programming techniques (PDM, VD, MCG, RFM), p. 388.
ITiCSEITiCSE-2005-MendesGEMBR #collaboration #simulation #using
Using simulation and collaboration in CS1 and CS2 (AJM, AJG, ME, MJM, CB, MAR), pp. 193–197.
ITiCSEITiCSE-2005-PaisB05a #education #programming #user interface
Use of flash movies for teaching GUI programming (RP, JPB), p. 390.
ITiCSEITiCSE-2005-PatersonHBM #data type #ide #using
Using the BlueJ IDE in a data structures course (JHP, JH, MB, AM), p. 349.
ITiCSEITiCSE-2005-Penha-Lopes #open source #question #why
Why use an open source e-voting system? (JMPL), p. 412.
ITiCSEITiCSE-2005-Rosenthal #multi #recursion #using
Introducing recursion by using multimedia (TR), p. 374.
ITiCSEITiCSE-2005-SternMH #how #student
You can lead a horse to water: how students really use pedagogical software (LS, SM, RH), pp. 246–250.
ITiCSEITiCSE-2005-TobinW #education #security #using
Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
ITiCSEITiCSE-2005-XinogalosS #concept #object-oriented #process #student #using
Using hands-on activities for motivating students with OOP concepts before they are asked to implement them (SX, MS), p. 380.
WRLAWRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-LeeYY #analysis #automation #grammarware #pointer #source code #using #verification
Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
FASEFASE-2005-EichbergSM #using
Using Annotations to Check Structural Properties of Classes (ME, TS, MM), pp. 237–252.
FASEFASE-2005-HammoudaHPK #using #variability
Managing Variability Using Heterogeneous Feature Variation Patterns (IH, JH, MP, KK), pp. 145–159.
FASEFASE-2005-RodriguesRU #component #concurrent #predict #reliability #using
Using Scenarios to Predict the Reliability of Concurrent Component-Based Software Systems (GNR, DSR, SU), pp. 111–126.
FoSSaCSFoSSaCS-2005-BouyerCD #automaton #fault #using
Fault Diagnosis Using Timed Automata (PB, FC, DD), pp. 219–233.
TACASTACAS-2005-BouquetDLU #ml #named #specification #using
JML-Testing-Tools: A Symbolic Animator for JML Specifications Using CLP (FB, FD, BL, MU), pp. 551–556.
TACASTACAS-2005-Marrero #using
Using BDDs to Decide CTL (WM), pp. 222–236.
TACASTACAS-2005-VardhanSVA #using #verification
Using Language Inference to Verify ω-Regular Properties (AV, KS, MV, GA), pp. 45–60.
TACASTACAS-2005-XieMSN #execution #framework #generative #named #object-oriented #symbolic computation #testing #using
Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic Execution (TX, DM, WS, DN), pp. 365–381.
CSMRCSMR-2005-BernardiL #case study #diagrams #named
UsCaAb: A Tool for Abstracting Use Case Diagrams (MLB, GADL), p. 194.
CSMRCSMR-2005-BoronatCR #automation #logic #re-engineering #using
Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine (AB, JÁC, IR), pp. 228–231.
CSMRCSMR-2005-GreevyD #analysis #approach #correlation #using
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
ICSMEICSM-2005-BriandLL #aspectj #distributed #using
Tracing Distributed Systems Executions Using AspectJ (LCB, YL, JL), pp. 81–90.
ICSMEICSM-2005-HaoZZMS #case study #fault #locality #reduction #testing #using
Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study (DH, LZ, HZ, HM, JS), pp. 683–686.
ICSMEICSM-2005-KorelTH #modelling #using
Test Prioritization Using System Models (BK, LHT, MH), pp. 559–568.
ICSMEICSM-2005-SalahMAP #dynamic analysis #towards
Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla (MS, SM, GA, MDP), pp. 639–642.
ICSMEICSM-2005-Sorkowitz #maintenance #metric #testing #using
Using Metrics to Improve Maintenance Testing (AS), p. 725.
ICSMEICSM-2005-StorzerG #analysis #aspect-oriented #evolution #using
Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
ICSMEICSM-2005-SusaniD #contract #maintenance #specification #using
Cross-Organizational Service Maintenance Using Temporal Availability Specification and Contracts (OvS, PD), pp. 230–239.
ICSMEICSM-2005-ZhangZ #configuration management #evolution #maintenance #self #using
Using Self-Reconfigurable Workplaces to Automate the Maintenance of Evolving Business Applications (QZ, YZ), pp. 219–229.
ICSMEICSM-IT-2005-ShepherdRP #aspect-oriented #evolution #using
Using AOP to Ease Evolution (DS, TR, LLP), pp. 16–25.
IWPCIWPC-2005-EnglishBCL #c++ #empirical
An Empirical Study of the Use of Friends in C++ Software (ME, JB, TC, KL), pp. 329–332.
IWPCIWPC-2005-Koskinen #tool support
HyperSoft System: Tool Demonstration and Use Example (JK), pp. 153–156.
MSRMSR-2005-ConklinHC #analysis #collaboration #repository #using
Collaboration using OSSmole: a repository of FLOSS data and analyses (MC, JH, KC), pp. 76–80.
MSRMSR-2005-KimN #comprehension #evolution #using
Using a clone genealogy extractor for understanding and supporting evolution of code clones (MK, DN), pp. 1–5.
MSRMSR-2005-NeamtiuFH #abstract syntax tree #comprehension #evolution #source code #syntax #using
Understanding source code evolution using abstract syntax tree matching (IN, JSF, MWH), pp. 81–85.
MSRMSR-2005-OhiraOOM #collaboration #network #social #using
Accelerating cross-project knowledge collaboration using collaborative filtering and social networks (MO, NO, TO, KiM), pp. 71–75.
SCAMSCAM-2005-ZhangBCD #implementation #using #verification
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation (HZ, JSB, JRC, JD), pp. 87–96.
WCREWCRE-2005-WangCD #security #using
Enhancing Security Using Legality Assertions (LW, JRC, TRD), pp. 35–44.
SASSAS-2005-BagnaraRZ #algebra #generative #invariant #using
Generation of Basic Semi-algebraic Invariants Using Convex Polyhedra (RB, ERC, EZ), pp. 19–34.
SASSAS-2005-HarrenN #assembly #dependent type #safety #using
Using Dependent Types to Certify the Safety of Assembly Code (MH, GCN), pp. 155–170.
CIAACIAA-2005-JurdzinskiO #automaton #strict
Restricting the Use of Auxiliary Symbols for Restarting Automata (TJ, FO), pp. 176–187.
CIAACIAA-2005-SubramanianS #automaton #documentation #finite #recursion #using #xml
Compressing XML Documents Using Recursive Finite State Automata (HS, PS), pp. 282–293.
FMFM-2005-DonaldsonM #automation #detection #model checking #symmetry #using
Automatic Symmetry Detection for Model Checking Using Computational Group Theory (AFD, AM), pp. 481–496.
FMFM-2005-Johnson #debugging #formal method #using
The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions (CWJ), pp. 9–25.
FMFM-2005-PierikCB #using
Controlling Object Allocation Using Creation Guards (CP, DC, FSdB), pp. 59–74.
IFMIFM-2005-BostromW #development #distributed #fault tolerance #grid #using
Development of Fault Tolerant Grid Applications Using Distributed B (PB, MAW), pp. 167–186.
IFMIFM-2005-LamP #consistency #diagrams #sequence chart #statechart #using #π-calculus
Consistency Checking of Sequence Diagrams and Statechart Diagrams Using the π-Calculus (VSWL, JAP), pp. 347–365.
SEFMSEFM-2005-BarthePS #analysis #logic #memory management #precise #using
Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
SEFMSEFM-2005-CeroneLC #analysis #formal method #human-computer #interactive #model checking #using
Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
SEFMSEFM-2005-SubramaniamS #protocol #using
Using Dominators to Extract Observable Protocol Contexts (MS, JS), pp. 96–105.
SEFMSEFM-2005-Trakhtenbrot #debugging #testing #verification
Use of Verification for Testing and Debugging of Complex Reactive Systems (MBT), pp. 13–22.
SEFMSEFM-2005-Trentelman #correctness #proving #using
Proving Correctness of JavaCard DL Taclets using Bali (KT), pp. 160–169.
ICFPICFP-2005-Nilsson #algebra #data type #functional #optimisation #programming #using
Dynamic optimization for functional reactive programming using generalized algebraic data types (HN), pp. 54–65.
IFLIFL-2005-ShafarenkoSHGT #case study #equation #experience #implementation #lessons learnt #using
Implementing a Numerical Solution of the KPI Equation Using Single Assignment C: Lessons and Experiences (AVS, SBS, SH, CG, KT), pp. 160–177.
CHICHI-2005-Ahlstrom #modelling #using
Modeling and improving selection in cascading pull-down menus using Fitts’ law, the steering law and force fields (DA), pp. 61–70.
CHICHI-2005-CostanzaIA #interface #mobile #towards #using
Toward subtle intimate interfaces for mobile devices using an EMG controller (EC, SAI, RA), pp. 481–489.
CHICHI-2005-DabbishKFK #comprehension #email #predict
Understanding email use: predicting action on a message (LAD, REK, SRF, SBK), pp. 691–700.
CHICHI-2005-GarfinkelMSNM #email #how
How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
CHICHI-2005-HoI #mobile #using
Using context-aware computing to reduce the perceived burden of interruptions from mobile devices (JH, SSI), pp. 909–918.
CHICHI-2005-Johnson #design #interactive #lessons learnt #simulation
Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuation simulations (CWJ), pp. 651–660.
CHICHI-2005-KarlsonBS #design
AppLens and launchTile: two designs for one-handed thumb use on small devices (AKK, BBB, JS), pp. 201–210.
CHICHI-2005-MarshallB #using
Saving and using encountered information: implications for electronic periodicals (CCM, SAB), pp. 111–120.
CHICHI-2005-MillenMGWB #collaboration
Patterns of media use in an activity-centric collaborative environment (DRM, MJM, WG, EW, BB), pp. 879–888.
CHICHI-2005-SadasivanGGD #eye tracking
Use of eye movements as feedforward training for a synthetic aircraft inspection task (SS, JSG, AKG, ATD), pp. 141–149.
CHICHI-2005-ShklovskiM #lens
Exploring technology adoption and use through the lens of residential mobility (IS, SDM), pp. 621–630.
CHICHI-2005-YeeP #learning #named #online #using
StudioBRIDGE: using group, location, and event information to bridge online and offline encounters for co-located learning groups (SY, KSP), pp. 551–560.
SOFTVISSOFTVIS-2005-BaloianBL #algorithm #concept #using #visualisation
Algorithm visualization using concept keyboards (NAB, HB, WL), pp. 7–16.
SOFTVISSOFTVIS-2005-GhoniemCFJ #constraints #graph #programming #using #visualisation
Peeking in solver strategies using explanations visualization of dynamic graphs for constraint programming (MG, HC, JDF, NJ), pp. 27–36.
SOFTVISSOFTVIS-2005-JohannesSW #algorithm #analysis #animation #using #visualisation
Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
SOFTVISSOFTVIS-2005-KholkarKSV #analysis #case study #specification #visual notation
Visual specification and analysis of use cases (DK, GMK, US, RV), pp. 77–85.
SOFTVISSOFTVIS-2005-StoreyCG #bibliography #development #framework #on the #process #visualisation
On the use of visualization to support awareness of human activities in software development: a survey and a framework (MADS, DC, DMG), pp. 193–202.
VISSOFTVISSOFT-2005-BalzerD #graph #using
Exploring Relations within Software Systems Using Treemap Enhanced Hierarchical Graphs (MB, OD), pp. 89–94.
VISSOFTVISSOFT-2005-DucasseLR #comprehension #multi #using
Multi-level Method Understanding Using Microprints (SD, ML, RR), pp. 33–38.
AdaEuropeAdaEurope-2005-RogersW #ada #fault tolerance #using
The Application of Compile-Time Reflection to Software Fault Tolerance Using Ada 95 (PR, AJW), pp. 236–247.
AdaEuropeAdaEurope-2005-VergnaudPK #component #distributed #middleware #using
Using the AADL to Describe Distributed Applications from Middleware to Software Components (TV, LP, FK), pp. 67–78.
AdaSIGAda-2005-AusdenN #c++ #using
Using ASIS to generate C++ bindings (HA, KAN), pp. 23–30.
AdaSIGAda-2005-Ruocco #case study #experience #using
Experiences using SPARK in an undergraduate CS course (ASR), pp. 37–40.
CAiSECAiSE-2005-DongenAV #petri net #reduction #using #verification
Verification of EPCs: Using Reduction Rules and Petri Nets (BFvD, WMPvdA, HMWV), pp. 372–386.
CAiSECAiSE-2005-Evermann #analysis #concept #modelling #ontology #using
The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
CAiSECAiSE-2005-Franch #lightweight #modelling #on the
On the Lightweight Use of Goal-Oriented Models for Software Package Selection (XF), pp. 551–566.
CAiSECAiSE-2005-HodelHD #documentation #editing #using
Using Text Editing Creation Time Meta Data for Document Management (TBH, RH, KRD), pp. 105–118.
CAiSECAiSE-2005-NecibF #ontology #query #using
Query Processing Using Ontologies (CBN, JCF), pp. 167–186.
CAiSECAiSE-2005-TheodoratosD #graph #query #using
Querying Tree-Structured Data Using Dimension Graphs (DT, TD), pp. 201–215.
EDOCEDOC-2005-QuartelDS #approach #using
An approach to relate business and application services using ISDL (DACQ, RMD, MvS), pp. 157–168.
EDOCEDOC-2005-WangWCWFUCGL #adaptation #enterprise #monitoring #using
Service Level Management using QoS Monitoring, Diagnostics, and Adaptation for Networked Enterprise Systems (GW, CW, AC, HW, CKF, SAU, YLC, WG, JL), pp. 239–250.
EDOCEDOC-2005-WitthawaskulJ #modelling #transaction #using
Transaction Support Using Unit of Work Modeling in the Context of MDA (WW, REJ), pp. 131–141.
ICEISICEIS-v1-2005-FaverioSB #enterprise #implementation #process #using
Using Critical Success Factors for Assessing Critical Activities in ERP Implementation within SMEs (PF, DS, GB), pp. 285–292.
ICEISICEIS-v1-2005-Fernandez #design #security #uml #using
Security Patterns and Secure Systems Design Using UML (EBF), p. 21.
ICEISICEIS-v1-2005-PequenoA #semantics #using
Using Correspondence Assertions to Specify the Semantics of Views in an Object-Relational Data Warehouse (VMP, JNA), pp. 219–225.
ICEISICEIS-v2-2005-AhmanH #approach #game studies #reduction #simulation #using
Using a Game Theoretical Approach for Experimental Simulation of Brood Reduction — Conflict and Co-Operation, Effect on Brood Size with Limited Resources (, LH), pp. 220–225.
ICEISICEIS-v2-2005-CarrascoVG #clustering #using
Using DMFSQL for Financial Clustering (RAC, MAVM, JG), pp. 135–141.
ICEISICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based #using
Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
ICEISICEIS-v2-2005-Fu #using
Construction of Decision Trees Using Data Cube (LF), pp. 119–126.
ICEISICEIS-v2-2005-KumarKDB #clustering #mining #using #web
Web Usage Mining Using Rough Agglomerative Clustering (PK, PRK, SKD, RSB), pp. 315–320.
ICEISICEIS-v2-2005-NilssonFX #classification #using
Clinical Decision Support by Time Series Classification Using Wavelets (MN, PF, NX), pp. 169–175.
ICEISICEIS-v3-2005-TanL #enterprise #framework #modelling #problem #simulation #using
Enterprise Infrastructure Planning — Modelling and Simulation Using the Problem Articulation Method (ST, KL), pp. 240–245.
ICEISICEIS-v4-2005-CardosoSS #ontology #using #web
Using Ontologies to Prospect Offers on the Web (RCC, FdFdS, ACS), pp. 200–207.
ICEISICEIS-v4-2005-RamirezB #enterprise #using #web #web service
Integrating Agent Technologies into Enterprise Systems Using Web Services (EHR, RFB), pp. 11–15.
ICEISICEIS-v4-2005-SaleemB #algorithm #grid #scheduling #search-based #using
Job Scheduling in Computational Grid Using Genetic Algorithm (MS, SB), pp. 163–169.
ICEISICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network #using
An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
ICEISICEIS-v5-2005-DixitM #classification #documentation #using
Electronic Document Classification Using Support Vector Machine — An Application for E-Learning (SD, LKM), pp. 191–198.
ICEISICEIS-v5-2005-GarciaLMGGL #empirical #usability #using
A Controlled Experiment for Measuring the Usability of Webapps Using Patterns (FJG, MDL, FMS, JAG, PG, CL), pp. 67–74.
CIKMCIKM-2005-AfratiLL #adaptation #query #using #web
Answering aggregation queries on hierarchical web sites using adaptive sampling (FNA, PVL, CL), pp. 237–238.
CIKMCIKM-2005-AminiTULG #documentation #learning #using #xml
Learning to summarise XML documents using content and structure (MRA, AT, NU, ML, PG), pp. 297–298.
CIKMCIKM-2005-BaiSBNC #information retrieval #modelling #query #using
Query expansion using term relationships in language models for information retrieval (JB, DS, PB, JYN, GC), pp. 688–695.
CIKMCIKM-2005-BotWCL #automation #classification #concept #documentation #generative #using
Generating better concept hierarchies using automatic document classification (RSB, YfBW, XC, QL), pp. 281–282.
CIKMCIKM-2005-ChiritaDN #detection #named #ranking #using
MailRank: using ranking for spam detection (PAC, JD, WN), pp. 373–380.
CIKMCIKM-2005-Collins-ThompsonC #modelling #query #random #using
Query expansion using random walk models (KCT, JC), pp. 704–711.
CIKMCIKM-2005-GuptaNR #performance #using
Efficient data dissemination using locale covers (SG, JN, CVR), pp. 243–244.
CIKMCIKM-2005-HalachevST #sequence #using
Exact match search in sequence data using suffix trees (MH, NS, AT), pp. 123–130.
CIKMCIKM-2005-HaradaH #order #using
Order checking in a CPOE using event analyzer (LH, YH), pp. 549–555.
CIKMCIKM-2005-JiangZ #markov #modelling #using
Accurately extracting coherent relevant passages using hidden Markov models (JJ, CZ), pp. 289–290.
CIKMCIKM-2005-KangHLM #feedback #modelling #statistics #using
Establishing value mappings using statistical models and user feedback (JK, TSH, DL, PM), pp. 68–75.
CIKMCIKM-2005-KanT #classification #performance #using
Fast webpage classification using URL features (MYK, HONT), pp. 325–326.
CIKMCIKM-2005-KoloniariPPT #query #using
Query workload-aware overlay construction using histograms (GK, YP, EP, TT), pp. 640–647.
CIKMCIKM-2005-LeonardiB #approach #database #detection #documentation #relational #using #xml
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
CIKMCIKM-2005-MangoldSM #database #information management #intranet #using
Improving intranet search-engines using context information from databases (CM, HS, BM), pp. 349–350.
CIKMCIKM-2005-Melucci #modelling #using
Context modeling and discovery using vector space bases (MM), pp. 808–815.
CIKMCIKM-2005-MiaoKM #clustering #comparative #documentation #evaluation #n-gram #using
Document clustering using character N-grams: a comparative evaluation with term-based and word-based clustering (YM, VK, EEM), pp. 357–358.
CIKMCIKM-2005-OrlandicLY #clustering #effectiveness #performance #reduction #using
Clustering high-dimensional data using an efficient and effective data space reduction (RO, YL, WGY), pp. 201–208.
CIKMCIKM-2005-PrasadK #performance #query #sequence #using #xml
Efficient indexing and querying of XML data using modified Prüfer sequences (KHP, PSK), pp. 397–404.
CIKMCIKM-2005-TheodoratosDKG #data flow #query #semantics #using
Semantic querying of tree-structured data sources using partially specified tree patterns (DT, TD, AK, NHG), pp. 712–719.
CIKMCIKM-2005-VuG #retrieval #using
Using RankBoost to compare retrieval systems (HTV, PG), pp. 309–310.
CIKMCIKM-2005-WhitelawGA #analysis #sentiment #using
Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
ECIRECIR-2005-AyacheQC #classification #using #video
Video Shot Classification Using Lexical Context (SA, GQ, MC), pp. 549–551.
ECIRECIR-2005-CliftonT #framework #named #using
Knowing-Aboutness: Question-Answering Using a Logic-Based Framework (TC, WJT), pp. 230–244.
ECIRECIR-2005-CoyleS #interactive #using #web
Enhancing Web Search Result Lists Using Interaction Histories (MC, BS), pp. 543–545.
ECIRECIR-2005-SiersdorferW #classification #strict #using
Using Restrictive Classification and Meta Classification for Junk Elimination (SS, GW), pp. 287–299.
ECIRECIR-2005-YangJZY #documentation #effectiveness #retrieval #using
Improving Retrieval Effectiveness by Using Key Terms in Top Retrieved Documents (LY, DHJ, GZ, NY), pp. 169–184.
ICMLICML-2005-BurgesSRLDHH #learning #rank #using
Learning to rank using gradient descent (CJCB, TS, ER, AL, MD, NH, GNH), pp. 89–96.
ICMLICML-2005-CalinonB #framework #gesture #probability #recognition #using
Recognition and reproduction of gestures using a probabilistic framework combining PCA, ICA and HMM (SC, AB), pp. 105–112.
ICMLICML-2005-CarneyCDL #network #predict #probability #using
Predicting probability distributions for surf height using an ensemble of mixture density networks (MC, PC, JD, CL), pp. 113–120.
ICMLICML-2005-GuptaG #clustering #hybrid #robust #using
Robust one-class clustering using hybrid global and local search (GG, JG), pp. 273–280.
ICMLICML-2005-IeWNL #adaptation #multi #recognition #using
Multi-class protein fold recognition using adaptive codes (EI, JW, WSN, CSL), pp. 329–336.
ICMLICML-2005-JinCS #information retrieval #using
Learn to weight terms in information retrieval using category information (RJ, JYC, LS), pp. 353–360.
ICMLICML-2005-JinZ #algorithm #probability #using
A smoothed boosting algorithm using probabilistic output codes (RJ, JZ), pp. 361–368.
ICMLICML-2005-KolterM #concept #using
Using additive expert ensembles to cope with concept drift (JZK, MAM), pp. 449–456.
ICMLICML-2005-LiuXC #graph #predict #using
Predicting protein folds with structural repeats using a chain graph model (YL, EPX, JGC), pp. 513–520.
ICMLICML-2005-MadsenKE #modelling #using #word
Modeling word burstiness using the Dirichlet distribution (REM, DK, CE), pp. 545–552.
ICMLICML-2005-MichelsSN #learning #using
High speed obstacle avoidance using monocular vision and reinforcement learning (JM, AS, AYN), pp. 593–600.
ICMLICML-2005-Pietraszek #analysis #classification #optimisation #using
Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
ICMLICML-2005-PoczosL #analysis #independence #using
Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
ICMLICML-2005-SajamaO05a #modelling #reduction #using
Supervised dimensionality reduction using mixture models (S, AO), pp. 768–775.
ICMLICML-2005-SimsekWB #clustering #graph #identification #learning
Identifying useful subgoals in reinforcement learning by local graph partitioning (ÖS, APW, AGB), pp. 816–823.
ICMLICML-2005-WilliamsLXC #classification #using
Incomplete-data classification using logistic regression (DW, XL, YX, LC), pp. 972–979.
KDDKDD-2005-FujimakiYM #approach #detection #kernel #problem #using
An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
KDDKDD-2005-ManeSH #classification #independence #using
Estimating missed actual positives using independent classifiers (SM, JS, SYH), pp. 648–653.
KDDKDD-2005-NasraouiCR #metric #mining #retrieval #similarity #using #web
Using retrieval measures to assess similarity in mining dynamic web clickstreams (ON, CC, CR), pp. 439–448.
KDDKDD-2005-NevilleSJKPG #information management #relational #using
Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
KDDKDD-2005-Petrushin #mining #multi #self #using #video
Mining rare and frequent events in multi-camera surveillance video using self-organizing maps (VAP), pp. 794–800.
KDDKDD-2005-Sandler #classification #linear #on the #programming
On the use of linear programming for unsupervised text classification (MS), pp. 256–264.
KDDKDD-2005-WangLLMZ #using #web
Web object indexing using domain knowledge (MW, ZL, LL, WYM, NZ), pp. 294–303.
KDDKDD-2005-ZakiR #mining #reasoning #set #using
Reasoning about sets using redescription mining (MJZ, NR), pp. 364–373.
KDDKDD-2005-ZhouFSU #feature model #streaming #using
Streaming feature selection using alpha-investing (JZ, DPF, RAS, LHU), pp. 384–393.
LSOLSO-2005-DingsoyrB #using
Using Open Space Technology as a Method to Share Domain Knowledge (TD, FOB), pp. 102–106.
LSOLSO-2005-SantosMRFMAPA #development #information management #process #using
Using a Software Development Environment with Knowledge Management to Support Deploying Software Processes in Small and Medium Size Companies (GS, MM, ARR, SF, SM, AA, BDP, MA), pp. 72–76.
LSOLSO-2005-ZuserG #feedback #using
Using Feedback for Supporting Software Team Improvement (WZ, TG), pp. 119–123.
MLDMMLDM-2005-BarbuHAT #clustering #documentation #graph #image #summary #using
Clustering Document Images Using Graph Summaries (EB, PH, SA, ÉT), pp. 194–202.
MLDMMLDM-2005-EickRBV #assessment #clustering #distance #similarity #using
Using Clustering to Learn Distance Functions for Supervised Similarity Assessment (CFE, AR, AB, RV), pp. 120–131.
MLDMMLDM-2005-GuptaKB #classification #concept analysis #incremental #using
Incremental Classification Rules Based on Association Rules Using Formal Concept Analysis (AG, NK, VB), pp. 11–20.
MLDMMLDM-2005-HalveyKS #clustering #internet #navigation #predict #using
Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
MLDMMLDM-2005-HanCY #analysis #component #feature model #image #independence #using
Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
MLDMMLDM-2005-LegrandN #feature model #using
Feature Selection Method Using Preferences Aggregation (GL, NN), pp. 203–217.
MLDMMLDM-2005-LiFKL #automation #image #modelling #segmentation #using
Automatic Clinical Image Segmentation Using Pathological Modelling, PCA and SVM (SL, TF, AK, SL), pp. 314–324.
MLDMMLDM-2005-MakrehchiK #classification #using
Text Classification Using Small Number of Features (MM, MSK), pp. 580–589.
MLDMMLDM-2005-OhnishiI #analysis #component #detection #independence #using
Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
MLDMMLDM-2005-SiaL #clustering #dataset #scalability #using
Clustering Large Dynamic Datasets Using Exemplar Points (WS, MML), pp. 163–173.
MLDMMLDM-2005-SilvaJNP #geometry #learning #metric #using
Diagnosis of Lung Nodule Using Reinforcement Learning and Geometric Measures (ACS, VRdSJ, AdAN, ACdP), pp. 295–304.
MLDMMLDM-2005-VermaVV #approach #mining #using
Temporal Approach to Association Rule Mining Using T-Tree and P-Tree (KV, OPV, RV), pp. 651–659.
SEKESEKE-2005-BabarNJ #architecture #bibliography #framework #using
Assessing a Framework of Comparing Architecture Review Methods Using CMMI (MAB, MN, DRJ), pp. 400–403.
SEKESEKE-2005-BasitRJ #empirical #unification #using
An Empirical Study on Limits of Clone Unification Using Generics (HAB, DCR, SJ), pp. 109–114.
SEKESEKE-2005-BenavidesTC #constraints #feature model #modelling #programming #using
Using Constraint Programming to Reason on Feature Models (DB, PT, ARC), pp. 677–682.
SEKESEKE-2005-BrandaoSL #design #knowledge-based #multi #reasoning #using #verification
Multi-Agent System Design Verification Using Knowledge-based Reasoning (AB, VTdS, CJPdL), pp. 602–607.
SEKESEKE-2005-CangussuK #evaluation #integration #modelling #testing #using
Using Dynamic Models for the Evaluation of Integration and System Testing (JWC, RMK), pp. 436–441.
SEKESEKE-2005-ChiangTK #classification #multi #performance #using
Fast Class Rendering Using Multiresolution Classification in Discrete Cosine Transform Domain (TWC, TT, LJK), pp. 689–694.
SEKESEKE-2005-FalboRM #ontology #re-engineering #semantics #using
Using Ontologies to Add Semantics to a Software Engineering Environment (RdAF, FBR, RDM), pp. 151–156.
SEKESEKE-2005-GuanG #constraints #using #web #web service
Dealing with Web Service QoS factors using Constraint Hierarchy (YG, AKG), pp. 578–583.
SEKESEKE-2005-LiCLY #analysis #design #evolution #feature model #legacy #using
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
SEKESEKE-2005-LungXZ #architecture #composition #using
Software Architecture Decomposition Using Attributes (CHL, XX, MZ), pp. 747–752.
SEKESEKE-2005-MarewKB #aspect-oriented #case study #composition #development #functional #product line #using
Case Study on Systematic Functional Decomposition in a Product Line using Aspect Oriented Software Development (TM, JK, DHB), pp. 152–157.
SEKESEKE-2005-NabliFG #adaptation #algebra #data flow #multi #using
Adapting Multidimensional Schemes to Data sources using Algebraic Operators (AN, JF, FG), pp. 713–718.
SEKESEKE-2005-WangDS #alloy #reasoning #using
Reasoning Support for SWRL-FOL Using Alloy (HHW, JSD, JS), pp. 626–631.
SIGIRSIGIR-2005-AnhM #similarity #using
Simplified similarity scoring using term ranks (VNA, AM), pp. 226–233.
SIGIRSIGIR-2005-BeitzelJFGLCK #automation #classification #query #using #web
Automatic web query classification using labeled and unlabeled training data (SMB, ECJ, OF, DAG, DDL, AC, AK), pp. 581–582.
SIGIRSIGIR-2005-ChiritaNPK #metadata #personalisation #using
Using ODP metadata to personalize search (PAC, WN, RP, CK), pp. 178–185.
SIGIRSIGIR-2005-CuiSLKC #dependence #retrieval #using
Question answering passage retrieval using dependency relations (HC, RS, KL, MYK, TSC), pp. 400–407.
SIGIRSIGIR-2005-FergusonSGW #retrieval #scalability #set #using
Top subset retrieval on large collections using sorted indices (PF, AFS, CG, PW), pp. 599–600.
SIGIRSIGIR-2005-Grivolla #approach #automation #documentation #natural language #query #retrieval #using
Using Oracle for natural language document retrieval an automatic query reformulation approach (JG), pp. 605–606.
SIGIRSIGIR-2005-JinC #information retrieval #online #using
Study of cross lingual information retrieval using on-line translation systems (RJ, JYC), pp. 619–620.
SIGIRSIGIR-2005-KurlandL #modelling #rank #ranking #using
PageRank without hyperlinks: structural re-ranking using links induced by language models (OK, LL), pp. 306–313.
SIGIRSIGIR-2005-KurlandLD #clustering #modelling #pseudo #using
Better than the real thing?: iterative pseudo-query processing using cluster-based language models (OK, LL, CD), pp. 19–26.
SIGIRSIGIR-2005-LiangDT #order #query #summary #using
Using query term order for result summarisation (SFL, SD, JT), pp. 629–630.
SIGIRSIGIR-2005-RennieJ #detection #using
Using term informativeness for named entity detection (JDMR, TSJ), pp. 353–360.
SIGIRSIGIR-2005-ShenTZ #feedback #information management #information retrieval #using
Context-sensitive information retrieval using implicit feedback (XS, BT, CZ), pp. 43–50.
SIGIRSIGIR-2005-SunSZYLC #summary #using
Web-page summarization using clickthrough data (JTS, DS, HJZ, QY, YL, ZC), pp. 194–201.
SIGIRSIGIR-2005-TanCWXGG #classification #using
Using dragpushing to refine centroid text classifiers (ST, XC, BW, HX, MG, YG), pp. 653–654.
SIGIRSIGIR-2005-TryfonopoulosIK #information retrieval #network #using
Publish/subscribe functionality in IR environments using structured overlay networks (CT, SI, MK), pp. 322–329.
SIGIRSIGIR-2005-UdaniDDS #induction #using #web
Noun sense induction using web search results (GU, SD, AD, TS), pp. 657–658.
SIGIRSIGIR-2005-ViolaN #context-free grammar #learning #using
Learning to extract information from semi-structured text using a discriminative context free grammar (PAV, MN), pp. 330–337.
SIGIRSIGIR-2005-XiFFZCYZ #matrix #named #similarity #using
SimFusion: measuring similarity using unified relationship matrix (WX, EAF, WF, BZ, ZC, JY, DZ), pp. 130–137.
SIGIRSIGIR-2005-XueLYXZYC #clustering #collaboration #scalability #using
Scalable collaborative filtering using cluster-based smoothing (GRX, CL, QY, WX, HJZ, YY, ZC), pp. 114–121.
SIGIRSIGIR-2005-ZhangLLJXFCM #graph #using #web
Improving web search results using affinity graph (BZ, HL, YL, LJ, WX, WF, ZC, WYM), pp. 504–511.
SIGIRSIGIR-2005-ZhuJXG #classification #multi #using
Multi-labelled classification using maximum entropy method (SZ, XJ, WX, YG), pp. 274–281.
ECMFAECMDA-FA-2005-BurgstallerWFBF #development #distributed #monitoring #using
Using Domain Driven Development for Monitoring Distributed Systems (RB, EW, LF, MB, TF), pp. 19–24.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-SandersMKB #composition #specification #uml #using
Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-ShuiMKD #case study
Exceptional Use Cases (AS, SM, JK, CD), pp. 568–583.
MODELSMoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support #using
Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
MODELSMoDELS-2005-Pavlich-MariscalMD #aspect-oriented #data access #framework #programming #using
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming (JAPM, LM, SAD), pp. 537–552.
MODELSMoDELS-2005-SandersMKB #composition #specification #uml #using
Using UML 2.0 Collaborations for Compositional Service Specification (RTS, HNC, FAK, RB), pp. 460–475.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-ShuiMKD #case study
Exceptional Use Cases (AS, SM, JK, CD), pp. 568–583.
MODELSMoDELS-2005-VokacG #case study #challenge #domain-specific language #experience #multi #tool support #using
Using a Domain-Specific Language and Custom Tools to Model a Multi-tier Service-Oriented Application — Experiences and Challenges (MV, JMG), pp. 492–506.
ECOOPECOOP-2005-FuhrerTKDK #java #library #refactoring
Efficiently Refactoring Java Applications to Use Generic Libraries (RMF, FT, AK, JD, MK), pp. 71–96.
OOPSLAOOPSLA-2005-ArnoldWR #performance #repository #using #virtual machine
Improving virtual machine performance using a cross-run profile repository (MA, AW, VTR), pp. 297–311.
OOPSLAOOPSLA-2005-DoorenS #exception #flexibility #robust #using
Combining the robustness of checked exceptions with the flexibility of unchecked exceptions using anchored exception declarations (MvD, ES), pp. 455–471.
OOPSLAOOPSLA-2005-MartinLL #fault #query #security #using
Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
OOPSLAOOPSLA-2005-SangalJSJ #architecture #dependence #modelling #using
Using dependency models to manage complex software architecture (NS, EJ, VS, DJ), pp. 167–176.
OOPSLAOOPSLA-2005-ZdunA #design pattern #modelling #using
Modeling architectural patterns using architectural primitives (UZ, PA), pp. 133–146.
GPCEGPCE-2005-WuL #programming #reasoning #source code #using
Shadow Programming: Reasoning About Programs Using Lexical Join Point Information (PW, KJL), pp. 141–156.
LOPSTRLOPSTR-2005-PettorossiPS #array #protocol #using #verification
Transformational Verification of Parameterized Protocols Using Array Formulas (AP, MP, VS), pp. 23–43.
PPDPPPDP-2005-SahaR #analysis #incremental #logic programming #points-to #using
Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
PADLPADL-2005-BaileyS #constraints #satisfiability #set #using
Discovery of Minimal Unsatisfiable Subsets of Constraints Using Hitting Set Dualization (JB, PJS), pp. 174–186.
POPLPOPL-2005-GulwaniN #analysis #interprocedural #precise #random #using
Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
POPLPOPL-2005-XieA #detection #fault #satisfiability #scalability #using
Scalable error detection using boolean satisfiability (YX, AA), pp. 351–363.
RERE-2005-DiazPM #interactive #modelling #using
Modeling Interactions using Role-Driven Patterns (ID, OP, AM), pp. 209–220.
RERE-2005-HassineRD #case study #semantics
An ASM Operational Semantics for Use Case Maps (JH, JR, RD), pp. 467–468.
RERE-2005-LutzNPFT #analysis #identification #requirements #using
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-PottF #modelling #requirements #using
Using Cognitive Modeling for Requirements Engineering in Anesthesiology (CP, JlF), pp. 491–492.
RERE-2005-RobinsonWW #analysis #design #probability #requirements #using
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
RERE-2005-Some #case study #requirements #validation
Use Cases based Requirements Validation with Scenarios (SSS), pp. 465–466.
RERE-2005-WassonSLK #fault #requirements #using
Using Occurrence Properties of Defect Report Data to Improve Requirements (KSW, KNS, RRL, JCK), pp. 253–262.
SACSAC-2005-AgyemangBA #mining #n-gram #using #web
Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
SACSAC-2005-BalsaraR #model checking #predict #search-based #using
Prediction of inherited and genetic mutations using the software model checker SPIN (ZB, SR), pp. 208–209.
SACSAC-2005-BeigbederM #fuzzy #information retrieval #proximity #using
An information retrieval model using the fuzzy proximity degree of term occurences (MB, AM), pp. 1018–1022.
SACSAC-2005-BlakeCRIG #case study #component #development #product line #specification
Use case-driven component specification: a medical applications perspective to product line development (MBB, KC, SR, LI, KG), pp. 1470–1477.
SACSAC-2005-BuenoTT #algorithm #approximate #query #search-based #similarity #using
Accelerating approximate similarity queries using genetic algorithms (RB, AJMT, CTJ), pp. 617–622.
SACSAC-2005-CaetanoST #process #using
Using roles and business objects to model and understand business processes (AC, ARS, JMT), pp. 1308–1313.
SACSAC-2005-CaoBZBROA #modelling #using
Marshaling and unmarshaling models using the entity-relationship model (FC, BRB, WZ, CCB, RRR, AMO, MA), pp. 1553–1557.
SACSAC-2005-ChenA #analysis #approach #comparative #predict #sequence #using
A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
SACSAC-2005-ChoC #database #image #recognition #symmetry #using
Contour-based partial object recognition using symmetry in image databases (JSC, JC), pp. 1190–1194.
SACSAC-2005-FlanaginGRAS #automation #bibliography #generative #using
Automated terrain generation using LIDAR and waterbody survey data (MF, AG, JJR, MA, KS), pp. 1185–1189.
SACSAC-2005-ForaxDR #implementation #java
Reflection-based implementation of Java extensions: the double-dispatch use-case (RF, ÉD, GR), pp. 1409–1413.
SACSAC-2005-HastingsLOKPCJS #data transformation #distributed #using #xml
Grid-based management of biomedical data using an XML-based distributed data management system (SH, SL, SO, TMK, TP, ÜVÇ, DJ, JHS), pp. 105–109.
SACSAC-2005-HuP #3d #complexity #parametricity
Volume fractal dimensionality: a useful parameter for measuring the complexity of 3D protein spatial structures (MH, QP), pp. 172–176.
SACSAC-2005-InoueU #image #using
Retrieving lightly annotated images using image similarities (MI, NU), pp. 1031–1037.
SACSAC-2005-JayadevaprakashMP #generative #graph #transitive #using
Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
SACSAC-2005-JinD #metadata #using
Sanitizing using metadata in MetaXQuery (HJ, CED), pp. 1732–1736.
SACSAC-2005-KvaleLC #aspect-oriented #case study #programming #using
A case study on building COTS-based system using aspect-oriented programming (AAK, JL, RC), pp. 1491–1498.
SACSAC-2005-LambertMS #constraints #using
Solving strategies using a hybridization model for local search and constraint propagation (TL, EM, FS), pp. 398–403.
SACSAC-2005-LawL #constraints #matrix #modelling #symmetry #using
Breaking value symmetries in matrix models using channeling constraints (YCL, JHML), pp. 371–376.
SACSAC-2005-LiY #classification #predict #recursion #using
Using recursive classification to discover predictive features (FL, YY), pp. 1054–1058.
SACSAC-2005-Lu #correctness #declarative
Use of correctness assertions in declarative diagnosis (LL), pp. 1404–1408.
SACSAC-2005-MitchellP #metric #runtime #using
Using object-level run-time metrics to study coupling between objects (ÁM, JFP), pp. 1456–1462.
SACSAC-2005-RaposoPAV #automation #maintenance #query #using #web
Automatic wrapper maintenance for semi-structured web sources using results from previous queries (JR, AP, , ÁV), pp. 654–659.
SACSAC-2005-ReddyC #bound #using
Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
SACSAC-2005-SpohnG #network #problem #set #using
A solution for the location problem in arbitrary computer networks using generic dominating sets (MAS, JJGLA), pp. 739–743.
SACSAC-2005-TangsripairojS #repository #self #using #visualisation
Organizing and visualizing software repositories using the growing hierarchical self-organizing map (ST, MHS), pp. 1539–1545.
SACSAC-2005-TruongS #behaviour #modelling #uml #using #verification
Verification of behavioural elements of UML models using B (NTT, JS), pp. 1546–1552.
SACSAC-2005-WalkerMH #re-engineering #using
Surface reconstruction using shadow profilometry (CPW, NM, MGH), pp. 1250–1251.
SACSAC-2005-WanMA #array #markov #random #similarity #using
Cleaning microarray expression data using Markov random fields based on profile similarity (RW, HM, KFA), pp. 206–207.
SACSAC-OOPS-J-2005-ForaxDR #implementation #java
Reflection-based implementation of Java extensions: the double-dispatch use-case (RF, ÉD, GR), pp. 49–69.
ESEC-FSEESEC-FSE-2005-GearB #component #re-engineering #towards #using
Reengineering towards components using “Reconn-exion” (ALG, JB), pp. 370–373.
ESEC-FSEESEC-FSE-2005-MetzLG #approach #hybrid #performance #using
Performance data collection using a hybrid approach (EM, RL, TFG), pp. 126–135.
ESEC-FSEESEC-FSE-2005-PetterssonJ #approach #experience #industrial #lightweight #product line #using #web
Industrial experience with building a web portal product line using a lightweight, reactive approach (UP, SJ), pp. 326–335.
GTTSEGTTSE-2005-BenavidesSMC #analysis #automation #csp #feature model #java #modelling #using
Using Java CSP Solvers in the Automated Analyses of Feature Models (DB, SS, PTMA, ARC), pp. 399–408.
GTTSEGTTSE-2005-BravenboerGV #domain-specific language #stratego #using
MetaBorg in Action: Examples of Domain-Specific Language Embedding and Assimilation Using Stratego/XT (MB, RdG, EV), pp. 297–311.
GTTSEGTTSE-2005-EkmanH #analysis #composition #jastadd #java #using
Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
GTTSEGTTSE-2005-Galhardas #ajax #framework #using
Data Cleaning and Transformation Using the AJAX Framework (HG), pp. 327–343.
GTTSEGTTSE-2005-Mens #graph transformation #on the #refactoring
On the Use of Graph Transformations for Model Refactoring (TM), pp. 219–257.
GTTSEGTTSE-2005-WinterB #program transformation #using
Program Transformation Using HATS 1.84 (VLW, JB), pp. 378–396.
ICSEICSE-2005-ApiwattanapongOH #impact analysis #performance #precise #sequence #using
Efficient and precise dynamic impact analysis using execute-after sequences (TA, AO, MJH), pp. 432–441.
ICSEICSE-2005-DemskyR #data type #reasoning #using
Data structure repair using goal-directed reasoning (BD, MCR), pp. 176–185.
ICSEICSE-2005-HolmesM #recommendation #source code #using
Using structural context to recommend source code examples (RH, GCM), pp. 117–125.
ICSEICSE-2005-MaidenR #case study #process #requirements
Developing use cases and scenarios in the requirements process (NAMM, SR), pp. 561–570.
ICSEICSE-2005-MohagheghiAC #case study #development #estimation #incremental #scalability
Effort estimation of use cases for incremental large-scale software development (PM, BA, RC), pp. 303–311.
ICSEICSE-2005-NagappanB #fault #metric #predict
Use of relative code churn measures to predict system defect density (NN, TB), pp. 284–292.
ICSEICSE-2005-RockmanK #development
The software engineer and the development, management and use of intellectual property (HBR, VK), pp. 708–709.
ICSEICSE-2005-Siegel #architecture #design #distributed #modelling #question #why
Why use the model driven architecture to design and build distributed applications? (JS), p. 37.
ICSEICSE-2005-ZeidE #development #education #framework #using
Using peer reviews in teaching framework development (AZ, ME), pp. 627–628.
ATEMATEM-2004-GirbaFD05 #evolution #metamodelling #model transformation #using
Using Meta-Model Transformation to Model Software Evolution (TG, JMF, SD), pp. 57–64.
LDTALDTA-2005-SloaneW #eclipse #education #eli #programming language #using
Eclipse Support for Using Eli and Teaching Programming Languages (AMS, WMW), pp. 189–194.
SPLCSPLC-2005-ErikssonBB #approach #case study #domain model #modelling
The PLUSS Approach — Domain Modeling with Features, Use Cases and Use Case Realizations (ME, JB, KB), pp. 33–44.
SPLCSPLC-2005-HelferichHS #deployment #named #product line #quality #using
QFD-PPP: Product Line Portfolio Planning Using Quality Function Deployment (AH, GH, SS), pp. 162–173.
SPLCSPLC-2005-LamineJG #component #estimation #off the shelf #product line #using
Cost Estimation for Product Line Engineering Using COTS Components (SBABL, LLJ, HHBG), pp. 113–123.
SPLCSPLC-2005-ReiserW #set #using
Using Product Sets to Define Complex Product Decisions (MOR, MW), pp. 21–32.
SPLCSPLC-2005-TessierGTG #modelling #product line #system family #using
Using Variation Propagation for Model-Driven Management of a System Family (PT, SG, FT, JMG), pp. 222–233.
CCCC-2005-JiangMHLZZZ #multi #performance #using
Boosting the Performance of Multimedia Applications Using SIMD Instructions (WJ, CM, BH, JL, JZ, BZ, CZ), pp. 59–75.
CCCC-2005-LeLH #interprocedural #jit #optimisation #using
Using Inter-Procedural Side-Effect Information in JIT Optimizations (AL, OL, LJH), pp. 287–304.
CCCC-2005-Padovani #c++ #compilation #using
Compilation of Generic Regular Path Expressions Using C++ Class Templates (LP), pp. 27–42.
CCCC-2005-SadeSS #c #memory management #optimisation #parallel #thread #using
Optimizing C Multithreaded Memory Management Using Thread-Local Storage (YS, SS, RS), pp. 137–155.
CGOCGO-2005-DaiZHY #compilation #framework #optimisation #using
A General Compiler Framework for Speculative Optimizations Using Data Speculative Code Motion (XD, AZ, WCH, PCY), pp. 280–290.
CGOCGO-2005-StephensonA #classification #predict #using
Predicting Unroll Factors Using Supervised Classification (MS, SPA), pp. 123–134.
HPCAHPCA-2005-JaleelJ #memory management #using
Using Virtual Load/Store Queues (VLSQs) to Reduce the Negative Effects of Reordered Memory Instructions (AJ, BLJ), pp. 191–200.
HPCAHPCA-2005-MartyBHHMW #multi #using
Improving Multiple-CMP Systems Using Token Coherence (MRM, JDB, MDH, AJH, MMKM, DAW), pp. 328–339.
HPDCHPDC-2005-AlbrechtTSV #distributed #using
Distributed application management using Plush (JRA, CT, ACS, AV), pp. 281–282.
HPDCHPDC-2005-GrothMFWZM #empirical #using
Recording and using provenance in a protein compressibility experiment (PTG, SM, WF, SCW, KPZ, LM), pp. 201–208.
HPDCHPDC-2005-HuangS #adaptation #self #using
Building self-adapting services using service-specific knowledge (ACH, PS), pp. 34–43.
PPoPPPPoPP-2005-FreehL #clustering #energy #multi #source code #using
Using multiple energy gears in MPI programs on a power-scalable cluster (VWF, DKL), pp. 164–173.
PPoPPPPoPP-2005-ShachamSS #information management #model checking #scalability #using
Scaling model checking of dataraces using dynamic information (OS, MS, AS), pp. 107–118.
SOSPSOSP-2005-SoulesG #named #using
Connections: using context to enhance file search (CANS, GRG), pp. 119–132.
SOSPSOSP-2005-WitchelRA #linux #memory management #named #using
Mondrix: memory isolation for linux using mondriaan memory protection (EW, JR, KA), pp. 31–44.
ICSTSAT-J-2004-GummadiNV05 #algorithm #independence #satisfiability #set #using
Algorithms for Satisfiability Using Independent Sets of Variables (RG, NSN, VR), pp. 133–144.
ICSTSAT-J-2004-HuangD05 #performance #using
Using DPLL for Efficient OBDD Construction (JH, AD), pp. 157–172.
AMOSTAMOST-2005-ClermontP #testing #using
Using information about functions in selecting test cases (MC, DLP).
AMOSTAMOST-2005-KarrP #distributed #modelling #performance #statistics #testing #using
Distributed performance testing using statistical modeling (AFK, AAP).
AMOSTAMOST-2005-SherriffNWV #estimation #fault #haskell #metric #using
Early estimation of defect density using an in-process Haskell metrics model (MS, NN, LAW, MAV).
CADECADE-2005-Lev-AmiIRSSY #data type #first-order #linked data #logic #open data #reachability #simulation #using #verification
Simulating Reachability Using First-Order Logic with Applications to Verification of Linked Data Structures (TLA, NI, TWR, SS, SS, GY), pp. 99–115.
CAVCAV-2005-BarnerGR #concurrent #debugging #formal method #named #using
Wolf — Bug Hunter for Concurrent Software Using Formal Methods (SB, ZG, IR), pp. 153–157.
CAVCAV-2005-DwyerHHR #framework #model checking #using
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework (MBD, JH, MH, R), pp. 148–152.
ICLPICLP-2005-Ferreira #database #deduction #using
The MYDDAS Project: Using a Deductive Database for Traffic Characterization (MF), pp. 424–426.
ICLPICLP-2005-Fruhwirth #analysis #confluence #constraints #using
Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
ICLPICLP-2005-Saidi #bound #mining #process #using
Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
ICLPICLP-2005-Santos #concurrent #logic #semantics #transaction #using
Denotational Semantics Using Horn Concurrent Transaction Logic (MVS), pp. 431–432.
ICLPICLP-2005-Wilson #logic programming
Use of Logic Programming for Complex Business Rules (WGW), pp. 14–20.
LICSLICS-2005-WashburnW #data flow #parametricity #using
Generalizing Parametricity Using Information-flow (GW, SW), pp. 62–71.
ICSTSAT-2005-HeuleM #bound #linear #programming #random #satisfiability #using
Observed Lower Bounds for Random 3-SAT Phase Transition Density Using Linear Programming (MH, HvM), pp. 122–134.
ICSTSAT-2005-LingSB #logic #quantifier #satisfiability #synthesis #using
FPGA Logic Synthesis Using Quantified Boolean Satisfiability (ACL, DPS, SDB), pp. 444–450.
ICTSSTestCom-2005-BatoriA #framework #independence #modelling #testing #using
Using TTCN-3 for Testing Platform Independent Models (GB, DA), pp. 304–317.
ICTSSTestCom-2005-FlochRSV #empirical #lessons learnt #testing #using
Some Lessons from an Experiment Using TTCN-3 for the RIPng Testing (AF, FR, AS, CV), pp. 318–332.
ICTSSTestCom-2005-LeeJL #analysis #detection #smarttech #using
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
ICTSSTestCom-2005-LiL #anti #diagrams #thread #uml #using
Using Anti-Ant-like Agents to Generate Test Threads from the UML Diagrams (HL, CPL), pp. 69–80.
TLCATLCA-2005-MatwinFHC #data mining #formal method #mining #privacy #using
Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
VMCAIVMCAI-2005-SankaranarayananSM #analysis #linear #programming #scalability #using
Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
CBSECBSE-2004-MinCK #component #off the shelf #problem #using
Using Smart Connectors to Resolve Partial Matching Problems in COTS Component Acquisition (HGM, SWC, SDK), pp. 40–47.
WICSAWICSA-2004-BachmannBKS #architecture #design #experience #using
Experience Using an Expert System to Assist an Architect in Designing for Modifiability (FB, LJB, MK, CPS), pp. 281–284.
WICSAWICSA-2004-PettitG #architecture #behaviour #concurrent #modelling #petri net #using
Modeling Behavioral Patterns of Concurrent Software Architectures Using Petri Nets (RGPI, HG), pp. 57–68.
ASEASE-2004-Arshad #automation #configuration management #using
Automated Dynamic Reconfiguration using AI Planning (NA), pp. 402–405.
ASEASE-2004-Betin-CanB #concurrent #programming #using
Verifiable Concurrent Programming Using Concurrency Controllers (ABC, TB), pp. 248–257.
ASEASE-2004-BreuK #mining #using
Aspect Mining Using Event Traces (SB, JK), pp. 310–315.
ASEASE-2004-HotzKW #using
Using a Structure-based Configuration Tool for Product Derivation (LH, TK, KW), pp. 388–391.
ASEASE-2004-KhorG #algorithm #automation #branch #concept analysis #search-based #testing #using
Using a Genetic Algorithm and Formal Concept Analysis to Generate Branch Coverage Test Data Automatically (SK, PG), pp. 346–349.
ASEASE-2004-MemonX #automation #fault #persistent #testing #using
Using Transient/Persistent Errors to Develop Automated Test Oracles for Event-Driven Software (AMM, QX), pp. 186–195.
ASEASE-2004-SilvaF #evaluation #framework #object-oriented
Helping Object-Oriented Framework Use and Evaluation by means of Historical Use Information (RPeS, ECF), pp. 278–281.
ASEASE-2004-YuLB #case study #modelling #refactoring
Refactoring Use Case Models on Episodes (WY, JL, GB), pp. 328–331.
DACDAC-2004-Baron #configuration management #roadmap
Trends in the use of re-configurable platforms (MB), p. 415.
DACDAC-2004-LeeZB #analysis #using
Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
DACDAC-2004-LiLH #configuration management #reduction #using
FPGA power reduction using configurable dual-Vdd (FL, YL, LH), pp. 735–740.
DACDAC-2004-LiYYYL #adaptation #algorithm #design #representation #using
A packing algorithm for non-manhattan hexagon/triangle placement design by using an adaptive o-tree representation (JL, TY, BY, JY, CL), pp. 646–651.
DACDAC-2004-LuJ #using #verification
Verifying a gigabit ethernet switch using SMV (YL, MJ), pp. 230–233.
DACDAC-2004-NakamuraHKYY #c #c++ #communication #hardware #performance #using
A fast hardware/software co-verification method for system-on-a-chip by using a C/C++ simulator and FPGA emulator with shared register communication (YN, KH, IK, KY, TY), pp. 299–304.
DACDAC-2004-ObermeierJ #polynomial #using
Quadratic placement using an improved timing model (BO, FMJ), pp. 705–710.
DACDAC-2004-OhbaT #design #embedded #using
An SoC design methodology using FPGAs and embedded microprocessors (NO, KT), pp. 747–752.
DACDAC-2004-SrivastavaSB #optimisation #power management #process #statistics #using
Statistical optimization of leakage power considering process variations using dual-Vth and sizing (AS, DS, DB), pp. 773–778.
DACDAC-2004-SrivastavaSB04a #power management #using
Power minimization using simultaneous gate sizing, dual-Vdd and dual-Vth assignment (AS, DS, DB), pp. 783–787.
DACDAC-2004-VanderhaegenB #automation #design #geometry #programming #using
Automated design of operational transconductance amplifiers using reversed geometric programming (JPV, RWB), pp. 133–138.
DATEDATE-DF-2004-BainbridgePF #design #self #using
The Design and Test of a Smartcard Chip Using a CHAIN Self-Timed Network-on-Chip (WJB, LAP, SBF), pp. 274–279.
DATEDATE-DF-2004-ChenYSMGH #design #using
Demonstration of a SiGe RF LNA Design Using IBM Design Kits in 0.18um SiGe BiCMOS Technology (YC, XY, DS, JM, JG, DLH), pp. 22–27.
DATEDATE-DF-2004-SchmittR #design #low cost #prototype #using #verification
Verification of a Microcontroller IP Core for System-on-a-Chip Designs Using Low-Cost Prototyping Environments (SS, WR), pp. 96–101.
DATEDATE-v1-2004-BhuniaRR #analysis #using
Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
DATEDATE-v1-2004-BjesseK #abstraction #debugging #refinement #using
Using Counter Example Guided Abstraction Refinement to Find Complex Bugs (PB, JHK), pp. 156–161.
DATEDATE-v1-2004-BurnsSKY #synthesis #tool support #using
An Asynchronous Synthesis Toolset Using Verilog (FPB, DS, AK, AY), pp. 724–725.
DATEDATE-v1-2004-CaiL #power management #using
Dynamic Power Management Using Data Buffers (LC, YHL), pp. 526–531.
DATEDATE-v1-2004-DebJO #design #using
System Design for DSP Applications Using the MASIC Methodology (AKD, AJ, ), pp. 630–635.
DATEDATE-v1-2004-KielyG #modelling #performance #using
Performance Modeling of Analog Integrated Circuits Using Least-Squares Support Vector Machines (TK, GGEG), pp. 448–453.
DATEDATE-v1-2004-ManoliosS #automation #liveness #modelling #safety #using #verification #web
Automatic Verification of Safety and Liveness for XScale-Like Processor Models Using WEB Refinements (PM, SKS), pp. 168–175.
DATEDATE-v1-2004-PadmanabanT #fault #identification #performance #using
Using BDDs and ZBDDs for Efficient Identification of Testable Path Delay Faults (SP, ST), pp. 50–55.
DATEDATE-v1-2004-PerezMT #scheduling #using
A New Optimized Implemention of the SystemC Engine Using Acyclic Scheduling (DGP, GM, OT), pp. 552–557.
DATEDATE-v1-2004-RanjanVASVG #modelling #performance #synthesis #using
Fast, Layout-Inclusive Analog Circuit Synthesis using Pre-Compiled Parasitic-Aware Symbolic Performance Models (MR, WV, AA, HS, RV, GGEG), pp. 604–609.
DATEDATE-v1-2004-SehgalC #architecture #composition #performance #testing #using
Efficient Modular Testing of SOCs Using Dual-Speed TAM Architectures (AS, KC), pp. 422–427.
DATEDATE-v1-2004-SrinivasanBCC #metric #performance #using
Efficient Test Strategy for TDMA Power Amplifiers Using Transient Current Measurements: Uses and Benefit (GS, SB, SC, AC), pp. 280–285.
DATEDATE-v1-2004-StefanovZTKD #approach #design #network #process #using
System Design Using Kahn Process Networks: The Compaan/Laura Approach (TS, CZ, AT, BK, EFD), pp. 340–345.
DATEDATE-v1-2004-ZambrenoCSN #flexibility #hardware #using
Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
DATEDATE-v1-2004-ZhangV #memory management #using
Using a Victim Buffer in an Application-Specific Memory Hierarchy (CZ, FV), pp. 220–227.
DATEDATE-v1-2004-ZhanS #optimisation #polynomial #programming #using
Optimization of Integrated Spiral Inductors Using Sequential Quadratic Programming (YZ, SSS), pp. 622–629.
DATEDATE-v2-2004-BobrekPNPT #approach #hybrid #modelling #simulation #using
Modeling Shared Resource Contention Using a Hybrid Simulation/Analytical Approach (AB, JJP, JEN, JMP, DET), pp. 1144–1149.
DATEDATE-v2-2004-CheungPHC #equivalence #named #using
MINCE: Matching INstructions Using Combinational Equivalence for Extensible Processor (NC, SP, JH, JC), pp. 1020–1027.
DATEDATE-v2-2004-KumarBK #algorithm #analysis #array #embedded #memory management #named #reduction #using
MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
DATEDATE-v2-2004-LampropoulosAR #using
Minimization of Crosstalk Noise, Delay and Power Using a Modified Bus Invert Technique (ML, BMAH, PMR), pp. 1372–1373.
DATEDATE-v2-2004-LaouamriA #network #protocol #testing #using
Enhancing Testability of System on Chips Using Network Management Protocols (OL, CA), pp. 1370–1371.
DATEDATE-v2-2004-LeiningerGM #configuration management
Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
DATEDATE-v2-2004-LorenzM #algorithm #code generation #search-based #using
Phase Coupled Code Generation for DSPs Using a Genetic Algorithm (ML, PM), pp. 1270–1275.
DATEDATE-v2-2004-MillbergNTJ #network #using
Guaranteed Bandwidth Using Looped Containers in Temporally Disjoint Networks within the Nostrum Network on Chip (MM, EN, RT, AJ), pp. 890–895.
DATEDATE-v2-2004-MondalCM #analysis #approach #logic #using
A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
DATEDATE-v2-2004-OlbrichB #locality #probability #using
Placement Using a Localization Probability Model (LPM) (MO, EB), p. 1412.
DATEDATE-v2-2004-YooYBJD #concept #design #multi #using
Multi-Processor SoC Design Methodology Using a Concept of Two-Layer Hardware-Dependent Software (SY, MWY, AB, AAJ, MDN), pp. 1382–1383.
DATEDATE-v2-2004-ZhouZLLZC #analysis #using
Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
DATEDATE-v2-2004-ZhuM #architecture #communication #framework #multi #prototype #specification #using
Using a Communication Architecture Specification in an Application-Driven Retargetable Prototyping Platform for Multiprocessing (XZ, SM), pp. 1244–1249.
DATEDATE-2005-BernardiMQR04 #approach #logic #testing #using
Testing Logic Cores using a BIST P1500 Compliant Approach: A Case of Study (PB, GM, FQ, MSR), pp. 228–233.
DATEDATE-2005-Hillman04 #power management #reduction #using
Using Mobilize Power Management IP for Dynamic & Static Power Reduction in SoC at 130 nm (DH), pp. 240–246.
DocEngDocEng-2004-BagleyB #composition #using
Page composition using PPML as a link-editing script (SRB, DFB), pp. 134–136.
DocEngDocEng-2004-HardyBT #using #xml
Creating structured PDF files using XML templates (MRBH, DFB, PLT), pp. 99–108.
DocEngDocEng-2004-UlgesLB #documentation #using
Document capture using stereo vision (AU, CHL, TMB), pp. 198–200.
DocEngDocEng-2004-WatanabeSYO #using
A question answer system using mails posted to a mailing list (YW, KS, KY, YO), pp. 67–73.
DRRDRR-2004-Najman #documentation #estimation #using
Using mathematical morphology for document skew estimation (LN), pp. 182–191.
DRRDRR-2004-ShinJKKK #adaptation #image #polynomial #using
Block-adaptive binarization of business card images in PDA using modified quadratic filter (KTS, IHJ, NCK, CHK, TSK), pp. 92–101.
DRRDRR-2004-ZhangSH #image #retrieval #using #word
Word image retrieval using binary features (BZ, SNS, CH), pp. 45–53.
HTHT-2004-HorieY #analysis #documentation #set #using #web
Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
PODSPODS-2004-Tsaparas #ranking #using #web
Using Non-Linear Dynamical Systems for Web Searching and Ranking (PT), pp. 59–70.
SIGMODSIGMOD-2004-AgrawalAS #information management #using #web #web service
Enabling Sovereign Information Sharing Using Web Services (RA, DA, RS), pp. 873–877.
SIGMODSIGMOD-2004-BowmanS #optimisation #query #semantics #using
Optimization of Query Streams Using Semantic Prefetching (ITB, KS), pp. 179–190.
SIGMODSIGMOD-2004-ChaudhuriDS #effectiveness #estimation #statistics
Effective Use of Block-Level Sampling in Statistics Estimation (SC, GD, US), pp. 287–298.
SIGMODSIGMOD-2004-GovindarajuLWLM #database #performance #using
Fast Computation of Database Operations using Graphics Processors (NKG, BL, WW, MCL, DM), pp. 215–226.
SIGMODSIGMOD-2004-IpeirotisG #database #using
When one Sample is not Enough: Improving Text Database Selection Using Shrinkage (PGI, LG), pp. 767–778.
SIGMODSIGMOD-2004-JainCW #adaptation #resource management #using
Adaptive Stream Resource Management Using Kalman Filters (AJ, EYC, YFW), pp. 11–22.
SIGMODSIGMOD-2004-LermanGMK #automation #segmentation #using #web
Using the Structure of Web Sites for Automatic Segmentation of Tables (KL, LG, SM, CAK), pp. 119–130.
SIGMODSIGMOD-2004-TianDPRMM #database #implementation #relational #scalability #using #xml
Implementing a Scalable XML Publish/Subscribe System Using a Relational Database System (FT, BR, HP, TM, JM), pp. 479–490.
VLDBVLDB-2004-BalminOBCP #framework #query #using #xml #xpath
A Framework for Using Materialized XPath Views in XML Query Processing (AB, , KSB, RC, HP), pp. 60–71.
VLDBVLDB-2004-JohnsonKCKV #matrix #order #scalability #using
Compressing Large Boolean Matrices using Reordering Techniques (DSJ, SK, JC, SK, SV), pp. 13–23.
CSEETCSEET-2004-HassonC #case study #re-engineering #requirements #specification
A Case Study Involving the Use of Z to Aid Requirements Specification in the Software Engineering Course (PH, SC), pp. 84–90.
CSEETCSEET-2004-LeBlancLS #education #generative #re-engineering #source code #using
Generating Undergraduate Software Engineering Courses/Programs Using the Computing Curricula Software Engineering Volume (RJL, TCL, AEKS), pp. 167–168.
CSEETCSEET-2004-McKimE #design #education #multi #object-oriented #programming #using
Using a Multiple Term Project to Teach Object Oriented Programming and Design (JCM, HJCE), pp. 59–64.
ITiCSEITiCSE-2004-AdamsT #compilation #using #xml
Using XML in a compiler course (DRA, CT), pp. 4–6.
ITiCSEITiCSE-2004-CasselFLPKIG #using
Using CITIDEL to develop and share class plans (LNC, EAF, JL, MAPQ, DK, JI, CLG), p. 270.
ITiCSEITiCSE-2004-ConradF #object-oriented #paradigm #source code #using
Using the synergies between the object-oriented paradigm and mathematics in joint mathematics/computer science programs (MC, TF), p. 254.
ITiCSEITiCSE-2004-English #assessment #automation #source code #user interface #using
Automated assessment of GUI programs using JEWL (JE), pp. 137–141.
ITiCSEITiCSE-2004-Garner #learning #programming
The use of a code restructuring tool in the learning of programming (SG), p. 277.
ITiCSEITiCSE-2004-Hamer #approach #composition #design pattern #education #using
An approach to teaching design patterns using musical composition (JH), pp. 156–160.
ITiCSEITiCSE-2004-ImpagliazzoL #using
Using history to enhance computing courses (JI, JANL), p. 238.
ITiCSEITiCSE-2004-JippingKKL #network #programmable #using
Investigating wired and wireless networks using a java-based programmable sniffer (MJJ, AJK, NK, KL), pp. 12–16.
ITiCSEITiCSE-2004-Leska #education #programming #using
Introducing undergraduates to programming using robots in the general education curriculum (CL), p. 263.
ITiCSEITiCSE-2004-LeskaR #concept #game studies #learning #using
Learning O-O concepts in CS I using game projects (CL, JRR), p. 237.
ITiCSEITiCSE-2004-Lopez-HerrejonS #case study #experience #interactive #java #using
Using interactive technology in a short java course: an experience report (RELH, MS), pp. 203–207.
ITiCSEITiCSE-2004-ThomasM #database #education #research #scalability
Use of large databases for group projects at the nexus of teaching and research (RCT, RM), pp. 161–165.
ITiCSEITiCSE-2004-Waraich #education #logic #using
Using narrative as a motivating device to teach binary arithmetic and logic gates (AW), pp. 97–101.
ITiCSEITiCSE-WGR-2004-CanningMRR #c #using
Reading types in C using the right left walk method (JC, WM, AR, DR), pp. 52–54.
FASEFASE-2004-ChoppyR #case study #requirements #specification #using
Improving Use Case Based Requirements Using Formally Grounded Specifications (CC, GR), pp. 244–260.
FASEFASE-2004-HeG #automation #debugging #using
Automated Debugging Using Path-Based Weakest Preconditions (HH, NG), pp. 267–280.
FASEFASE-2004-KimRFL #data access #modelling #uml #using
Modeling Role-Based Access Control Using Parameterized UML Models (DKK, IR, RBF, NL), pp. 180–193.
FASEFASE-2004-OlveczkyM #analysis #maude #realtime #specification #using
Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
FoSSaCSFoSSaCS-2004-GenestMMP #partial order #specification #using #verification
Specifying and Verifying Partial Order Properties Using Template MSCs (BG, MM, AM, DP), pp. 195–210.
TACASTACAS-2004-DiethersH #design #named #object-oriented #using #verification
Vooduu: Verification of Object-Oriented Designs Using UPPAAL (KD, MH), pp. 139–143.
TACASTACAS-2004-KrcalY #analysis #automaton #decidability #problem #scheduling #using
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
TACASTACAS-2004-MailundW #graph #reachability #using
Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method (TM, MW), pp. 177–191.
TACASTACAS-2004-RasmussenLS #automaton #scheduling #using
Resource-Optimal Scheduling Using Priced Timed Automata (JIR, KGL, KS), pp. 220–235.
TACASTACAS-2004-RobbyRDH #framework #model checking #specification #using
Checking Strong Specifications Using an Extensible Software Model Checking Framework (R, ER, MBD, JH), pp. 404–420.
CSMRCSMR-2004-Al-EkramK #composition #concept #slicing #source code #using
Source Code Modularization Using Lattice of Concept Slices (RAE, KK), pp. 195–203.
CSMRCSMR-2004-HammoudaH #maintenance #using
Documenting Maintenance Tasks Using Maintenance Patterns (IH, MH), pp. 37–47.
CSMRCSMR-2004-RatiuDGM #design #detection #using
Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
CSMRCSMR-2004-Zdun #maintenance #re-engineering #using
Using Split Objects for Maintenance and Reengineering Tasks (UZ), pp. 105–114.
ICSMEICSM-2004-DangLMPPT #design #realtime #using #video #visual notation
Design Recovery of Real-Time Graphical Applications Using Video (CD, AVL, AM, KCP, TQP, JT), pp. 338–347.
ICSMEICSM-2004-MohanGL #approach #complexity #comprehension #concept #using
An Approach to Understanding Program Comprehensibility Using Spatial Complexity, Concept Assignment and Typographical Style (AM, NG, PJL), p. 530.
ICSMEICSM-2004-WernickH #evolution #programming #using
The Impact of Using Pair Programming on System Evolution: A Simulation-Based Study (PW, TH), pp. 422–426.
ICSMEICSM-2004-WhiteR #analysis #industrial #realtime #testing #using
Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
ICSMEICSM-2004-Woodworth #metric #quality #using
Using Metrics to Drive Quality Improvements and Value — Company Wide (BW), p. 2.
IWPCIWPC-2004-DanicicLH #execution #slicing #using
Building Executable Union Slices using Conditioned Slicing (SD, ADL, MH), pp. 89–99.
IWPCIWPC-2004-HassanH #architecture #development #using
Using Development History Sticky Notes to Understand Software Architecture (AEH, RCH), pp. 183–193.
IWPCIWPC-2004-KuzniarzSW #comprehension #empirical #modelling #uml #using
An Empirical Study on Using Stereotypes to Improve Understanding of UML Models (LK, MS, CW), pp. 14–23.
SCAMSCAM-2004-BruntinkD #metric #object-oriented #predict #testing #using
Predicting Class Testability using Object-Oriented Metrics (MB, AvD), pp. 136–145.
SCAMSCAM-2004-FatiregunHH #algorithm #evolution #search-based #sequence #using
Evolving Transformation Sequences using Genetic Algorithms (DF, MH, RMH), pp. 66–75.
SCAMSCAM-2004-MaruyamaY #automation #framework #java #representation #source code #using #xml
A CASE Tool Platform Using an XML Representation of Java Source Code (KM, SY), pp. 158–167.
SCAMSCAM-2004-Rothermel #analysis #source code #using
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
SCAMSCAM-2004-TourweM #concept analysis #mining #using
Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
WCREWCRE-2004-AbbasTC #using
Using DDL to Understand and Modify SimpleScalar (NA, ST, JEC), pp. 296–297.
WCREWCRE-2004-EmmerikW #decompiler #using
Using a Decompiler for Real-World Source Recovery (MVE, TW), pp. 27–36.
WCREWCRE-2004-MarinDM #analysis #aspect-oriented #identification #using
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
WCREWCRE-2004-MohanGL #approach #complexity #concept #using
An Initial Approach to Assessing Program Comprehensibility Using Spatial Complexity, Number of Concepts and Typographical Style (AM, NG, PJL), pp. 246–255.
WCREWCRE-2004-WuHH #evolution #using
Exploring Software Evolution Using Spectrographs (JW, RCH, AEH), pp. 80–89.
PLDIPLDI-2004-WhaleyL #alias #analysis #diagrams #pointer #using
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
PLDIPLDI-2004-YahavR #abstraction #safety #using #verification
Verifying safety properties using separation and heterogeneous abstractions (EY, GR), pp. 25–34.
PLDIPLDI-2004-ZhongOSD #array #using
Array regrouping and structure splitting using whole-program reference affinity (YZ, MO, XS, CD), pp. 255–266.
STOCSTOC-2004-HealyVV #nondeterminism #using
Using nondeterminism to amplify hardness (AH, SPV, EV), pp. 192–201.
STOCSTOC-2004-KleinbergS #collaboration #modelling #using
Using mixture models for collaborative filtering (JMK, MS), pp. 569–578.
FLOPSFLOPS-2004-HagiyaTYS #abstraction #analysis #automaton #logic #using
Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
CIAACIAA-2004-Polak #automaton #nondeterminism #using
Minimalizations of NFA Using the Universal Automaton (LP), pp. 325–326.
ICALPICALP-2004-AbbottAG #induction #representation #using
Representing Nested Inductive Types Using W-Types (MA, TA, NG), pp. 59–71.
IFMIFM-2004-Bujorianu #integration #specification #using
Integration of Specification Languages Using Viewpoints (MCB), pp. 421–440.
IFMIFM-2004-PickinJ #diagrams #sequence chart #uml #using
Using UML Sequence Diagrams as the Basis for a Formal Test Description Language (SP, JMJ), pp. 481–500.
SEFMSEFM-2004-BertoliniFFO #analysis #automaton #generative #network #probability #testing #using
Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
SEFMSEFM-2004-Fronk #algebra #analysis #approach #automation #petri net #using
Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
SEFMSEFM-2004-KazhamiakinPR #case study #requirements #using #verification #web #web service
Formal Verification of Requirements using SPIN: A Case Study on Web Services (RK, MP, MR), pp. 406–415.
SEFMSEFM-2004-Roy #finite #infinity #using #verification
Symbolic Verification of Infinite Systems using a Finite Union of DFAs (SR), pp. 56–66.
SEFMSEFM-2004-SistlaWZ #using
Checking Extended CTL properties Using Guarded Quotient Structures (APS, XW, MZ), pp. 87–94.
SEFMSEFM-2004-ZhangXW #constraints #execution #generative #symbolic computation #testing #theorem proving #using
Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques (JZ, CX, XW), pp. 242–250.
ICFPICFP-2004-TolmachAN #functional #implementation #logic #multi #thread #using
Implementing functional logic languages using multiple threads and stores (APT, SA, MN), pp. 90–102.
ICGTICGT-2004-CherchagoH #graph transformation #specification #using #web #web service
Specification Matching of Web Services Using Conditional Graph Transformation Rules (AC, RH), pp. 304–318.
ICGTICGT-2004-Rensink #first-order #graph #logic #representation #using
Representing First-Order Logic Using Graphs (AR), pp. 319–335.
CHICHI-2004-LudfordCFT #community #difference #online #using
Think different: increasing online community participation using uniqueness and group dissimilarity (PJL, DC, DF, LGT), pp. 631–638.
CHICHI-2004-Oulasvirta #research
Finding meaningful uses for context-aware technologies: the humanistic research strategy (AO), pp. 247–254.
CHICHI-2004-VemuriDBS #recognition #speech #using
Improving speech playback using time-compression and speech recognition (SV, PD, WB, CS), pp. 295–302.
CSCWCSCW-2004-BeenenLWCFRK #community #motivation #online #social #using
Using social psychology to motivate contributions to online communities (GB, KSL, XW, KC, DF, PR, REK), pp. 212–221.
CSCWCSCW-2004-HaynesPS #evaluation
Situating evaluation in scenarios of use (SRH, SP, ALS), pp. 92–101.
CSCWCSCW-2004-TseHSG #clustering #dependence #how #people
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces (ET, JH, SDS, SG), pp. 252–261.
AdaEuropeAdaEurope-2004-AlvarezPOSN #ada #education #framework #realtime #using
Teaching Real-Time Systems Around a Digital Model Railroad Platform Using Ada (, JAP, FJO, PS, PJNL), pp. 213–224.
AdaEuropeAdaEurope-2004-VrandecicS #ada #using #xml
XML4Ada95 Accessing XML Using the DOM in Ada95 (ZV, DS), pp. 178–189.
AdaSIGAda-2004-Brown #ada #education #using
Teaching graphics using Ada (CWB), pp. 47–50.
CAiSECAiSE-2004-MunozO #adaptation #development #metadata #ontology #standard #using
Adaptive Web-Based Courseware Development Using Metadata Standards and Ontologies (LSM, JPMdO), pp. 414–428.
CAiSECAiSE-2004-NuffelenCDAB #integration #using
Data Integration Using ID-Logic (BVN, ACC, MD, OA, MB), pp. 67–81.
CAiSECAiSE-2004-SalinesiEZ #approach #evolution #modelling #requirements #similarity #using
A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
EDOCEDOC-2004-JaegerRM #composition #using #web #web service #workflow
QoS Aggregation for Web Service Composition using Workflow Patterns (MCJ, GRG, GM), pp. 149–159.
EDOCEDOC-2004-Patrascoiu #using #web #web service
Mapping EDOC to Web Services using YATL (OP), pp. 286–297.
EDOCEDOC-2004-PignatonVAB #component #using
Developing QoS-aware Component-Based Applications Using MDA Principles (RP, VAV, JIA, JB), pp. 172–183.
EDOCEDOC-2004-TandonG #modelling #using
Using Subject-Oriented Modeling to Develop Jini Applications (GT, SG), pp. 111–122.
ICEISICEIS-v1-2004-BaiHM #query #semantics #using
Improving View Selection in Query Rewriting Using Domain Semantics (QB, JH, MFM), pp. 177–183.
ICEISICEIS-v1-2004-FengMR #multi #performance #query #using
Improving Query Performance on OLAP-Data Using Enhanced Multidimensional Indices (YF, AM, HR), pp. 282–289.
ICEISICEIS-v1-2004-FerrandinC #consistency #database #integration #power of #semistructured data #using #xml
Referencial Integrity Model for XML Data Integrated from Heterogeneous Databases Systems — Using the Power of XML for Consistent Data Integration (MF, MSdC), pp. 15–20.
ICEISICEIS-v1-2004-LuciaST #clone detection #identification #similarity #using #web
Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
ICEISICEIS-v1-2004-Riaz-ud-DinK #adaptation #database #multi #named #using
ACME-DB: An Adaptive Caching Mechanism Using Multiple Experts For Database Buffers (FRuD, MK), pp. 192–201.
ICEISICEIS-v1-2004-ZhouNB #c++ #implementation #performance #using
An Efficient B+-Tree Implementation in C++ Using the STL Style (JZ, BN, GB), pp. 163–168.
ICEISICEIS-v2-2004-HamzaY #constraints #mining #regular expression #using
Mining Sequential Patterns with Regular Expression Constraints Using Sequential Pattern Tree (MH, KM, MY), pp. 116–121.
ICEISICEIS-v2-2004-KooptiwootS #mining #set #using
Mining the Relationships in the Form of the Predisposing Factors and Coincident Factors Among Numerical Dynamic Attributes in Time Series Data Set by Using the Combination of Some Existing Techniques (SK, MAS), pp. 327–334.
ICEISICEIS-v2-2004-KooptiwootS04a #idea #mining #set #using
Mining the Relationships in the Form of Predisposing Factor and Coincident Factor in Time Series Data Set by Using the Combination of some Existing Ideas with a new Idea from the Fact in the Chemical Reaction (SK, MAS), pp. 531–534.
ICEISICEIS-v2-2004-KotsiantisP #classification #hybrid #using
A Hybrid Decision Support Tool — Using Ensemble of Classifiers (SBK, PEP), pp. 448–456.
ICEISICEIS-v2-2004-LesslerERK #using
Dynamic Interest Profiles: Tracking User Interests Using Personal Information (JL, SE, JR, VK), pp. 281–288.
ICEISICEIS-v2-2004-MoutinhoTNC #approach #detection #network #using
Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
ICEISICEIS-v2-2004-MuesHVB #diagrams #using #visualisation
Comprehensible Credit-Scoring Knowledge Visualization Using Decision Tables and Diagrams (CM, JH, JV, BB), pp. 226–232.
ICEISICEIS-v2-2004-NetoCVMM #estimation #network #using
Monthly Flow Estimation Using Elman Neural Networks (LBN, PHGC, MLFV, JCCBSdM, LAM), pp. 153–158.
ICEISICEIS-v2-2004-SilvaCSGN #multi #network #using
Multiple Organ Failure Diagnosis Using Adverse Events and Neural Networks (ÁMS, PC, MFS, LG, JN), pp. 401–408.
ICEISICEIS-v2-2004-TagarelliTG #clustering #linear #mining #programming
Mining Scientific Results Through the Combined Use of Clustering and Linear Programming Techniques (AT, IT, SG), pp. 84–91.
ICEISICEIS-v2-2004-WuW #predict #probability #using #web
Predicting Web Requests Efficiently Using a Probability Model (SW, WW), pp. 48–53.
ICEISICEIS-v3-2004-AllouiO #architecture #process #uml #using
Describing Software-Intensive Process Architectures Using a UML-Based ADL (IA, FO), pp. 201–208.
ICEISICEIS-v3-2004-BragaMG #development #pattern matching #using
System Development Using a Pattern Language-Based Tool (RTVB, PCM, FSRG), pp. 155–162.
ICEISICEIS-v3-2004-Hiramatsu #concept #modelling #ontology #taxonomy #using
Ontology Modeling Tool Using Concept Dictionary and Inference (YH), pp. 225–230.
ICEISICEIS-v3-2004-MouratidisGM #design #information management #security #using
Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
ICEISICEIS-v3-2004-MukkamalaSAR #adaptation #detection #using
Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
ICEISICEIS-v3-2004-RenBRXYL #case study #prototype #refactoring
A Prototype Tool for Use Case Refactoring (SR, GB, KR, JX, WY, RL), pp. 173–178.
ICEISICEIS-v3-2004-Salimifard #component #modelling #petri net #using
Component-Based Modelling of Organisational Resources Using Coloured Petri Nets (KS), pp. 577–580.
ICEISICEIS-v3-2004-ToffolonD #consistency #development #nondeterminism
Human-Centered Systems Development and Use Inconsistencies (CT, SD), pp. 34–41.
ICEISICEIS-v3-2004-Tu #security #using
Using SAP System Configuration Security Test to Comply with Sarbanesoxley Act (JHT), pp. 581–583.
ICEISICEIS-v3-2004-VachonM #aspect-oriented #development #requirements #using
Achieving Supplementary Requirements Using Aspect-Oriented Development (JV, FM), pp. 584–587.
ICEISICEIS-v4-2004-EllisHK #assessment #framework #semantics #towards #web
Towards an Information Assessment Framework for Use with the Semantic Web (HJCE, GWH, TK), pp. 447–450.
ICEISICEIS-v4-2004-KanzowDA #deployment #how #multi #workflow
Flow-Oriented Deployment of a Multi-Agent Population for Dynamic Workflow Enactment: A Different View on How to Use Agents for Workflow Management (SK, KD, YA), pp. 510–514.
ICEISICEIS-v4-2004-KotinurmiLJS #design #documentation #framework #using
Integrating Design Document Management Systems Using the Rosettanet E-Business Framework (PK, HL, KJ, TS), pp. 502–509.
ICEISICEIS-v4-2004-MavromoustakosA #design #quality #using #web
Designing Quality Web Applications Using Patterns (SM, ASA), pp. 421–424.
ICEISICEIS-v4-2004-PoggiTT #composition #using
Using Agent Platforms for Service Composition (AP, MT, PT), pp. 98–105.
ICEISICEIS-v4-2004-ToivonenPHM #distributed #interactive #process #protocol #using
Using Interaction Protocols in Distributed Construction Processes (ST, TP, HH, JUM), pp. 344–349.
ICEISICEIS-v5-2004-Gouveia #using
Using Visuals to Convey Information (LBG), pp. 216–220.
ICEISICEIS-v5-2004-RousseauBMFM #multi #personalisation #profiling #repository #resource management #using
Personalised Resource Discovery Searching over Multiple Repository Types: Using User and Information Provider Profiling (BR, PB, PM, PF, VM), pp. 35–43.
ICEISICEIS-v5-2004-VartiainenS #education #fault #usability
Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education (TV, MTS), pp. 179–186.
CIKMCIKM-2004-AghiliAA #geometry #using
Protein structure alignment using geometrical features (SAA, DA, AEA), pp. 148–149.
CIKMCIKM-2004-BotW #algorithm #documentation #feedback #using
Improving document representations using relevance feedback: the RFA algorithm (RSB, YfBW), pp. 270–278.
CIKMCIKM-2004-ChomickiMS #consistency #query #using
Computing consistent query answers using conflict hypergraphs (JC, JM, SS), pp. 417–426.
CIKMCIKM-2004-ChungJM #clustering #dataset #mining #using
Mining gene expression datasets using density-based clustering (SC, JJ, DM), pp. 150–151.
CIKMCIKM-2004-Efron #documentation #using #web
The liberal media and right-wing conspiracies: using cocitation information to estimate political orientation in web documents (ME), pp. 390–398.
CIKMCIKM-2004-MaG #detection #feedback #information retrieval #using
Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
CIKMCIKM-2004-MaZMS #framework #learning #query #similarity #using
A framework for refining similarity queries using learning techniques (YM, QZ, SM, DYS), pp. 158–159.
CIKMCIKM-2004-MekhaldiLI #clustering #documentation #speech #using
Using bi-modal alignment and clustering techniques for documents and speech thematic segmentations (DM, DL, RI), pp. 69–77.
CIKMCIKM-2004-TomitaNI #graph #representation #similarity #using
Calculating similarity between texts using graph-based text representation model (JT, HN, MI), pp. 248–249.
CIKMCIKM-2004-XueZCYMXF #optimisation #using #web
Optimizing web search using web click-through data (GRX, HJZ, ZC, YY, WYM, WX, WF), pp. 118–126.
CIKMCIKM-2004-ZouLC #query #using #xml
Using a compact tree to index and query XML data (QZ, SL, WWC), pp. 234–235.
ECIRECIR-2004-ChenTH #corpus #identification #novel #using
Identification of Relevant and Novel Sentences Using Reference Corpus (HHC, MFT, MHH), pp. 85–98.
ECIRECIR-2004-CloughS04a #ambiguity #information retrieval #using #word
Cross-Language Information Retrieval Using EuroWordNet and Word Sense Disambiguation (PDC, MS), pp. 327–337.
ECIRECIR-2004-StokesNCS #analysis #using
Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
ICMLICML-2004-BlumLRR #learning #random #using
Semi-supervised learning using randomized mincuts (AB, JDL, MRR, RR).
ICMLICML-2004-FungDBR #algorithm #kernel #performance #using
A fast iterative algorithm for fisher discriminant using heterogeneous kernels (GF, MD, JB, RBR).
ICMLICML-2004-GabrilovichM #categorisation #feature model #using
Text categorization with many redundant features: using aggressive feature selection to make SVMs competitive with C4.5 (EG, SM).
ICMLICML-2004-HerschtalR #optimisation #using
Optimising area under the ROC curve using gradient descent (AH, BR).
ICMLICML-2004-NguyenS #clustering #learning #using
Active learning using pre-clustering (HTN, AWMS).
ICMLICML-2004-NguyenWJ #classification #detection #distributed #kernel #using
Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
ICMLICML-2004-RosalesAF #clustering #learning #using
Learning to cluster using local neighborhood structure (RR, KA, BJF).
ICMLICML-2004-SimsekB #abstraction #identification #learning #using
Using relative novelty to identify useful temporal abstractions in reinforcement learning (ÖS, AGB).
ICMLICML-2004-Zhang #algorithm #linear #predict #probability #problem #scalability #using
Solving large scale linear prediction problems using stochastic gradient descent algorithms (TZ0).
ICMLICML-2004-ZhangYK #algorithm #kernel #learning #matrix #using
Bayesian inference for transductive learning of kernel matrix using the Tanner-Wong data augmentation algorithm (ZZ, DYY, JTK).
ICPRICPR-v1-2004-AllierE #documentation #image #segmentation #using
Segmentation and Typography Extraction in Document Images Using Geodesic Active Regions (BA, HE), pp. 409–412.
ICPRICPR-v1-2004-BhowmickB #approximate #using
Approximate Fingerprint Matching Using Kd-Tree (PB, BBB), pp. 544–547.
ICPRICPR-v1-2004-BourlaiMK #architecture #smarttech #using #verification
Face Verification System Architecture Using Smart Cards (TB, KM, JK), pp. 793–796.
ICPRICPR-v1-2004-CaoF #metric #using
Simple Calibration Without Metric Information Using an Isoceles Trapezoid (XC, HF), pp. 104–107.
ICPRICPR-v1-2004-CevikalpW #recognition #using
Face Recognition by Using Discriminative Common Vectors (HC, DMW), pp. 326–329.
ICPRICPR-v1-2004-ChengLLC #classification #component #independence #kernel #using
Texture Classification Using Kernel Independent Component Analysi (JC, QL, HL, YWC), pp. 620–623.
ICPRICPR-v1-2004-ClausiY #comparison #markov #random #segmentation #using
Texture Segmentation Comparison Using Grey Level Co-Occurrence Probabilities and Markov Random Fields (DAC, BY), pp. 584–587.
ICPRICPR-v1-2004-CoskerMRH #animation #markov #speech #using
Speech Driven Facial Animation using a Hidden Markov Coarticulation Model (DC, ADM, PLR, YH), pp. 128–131.
ICPRICPR-v1-2004-FungM #parallel #using
Using Multiple Graphics Cards as a General Purpose Parallel Computer : Applications to Computer Vision (JF, SM), pp. 805–808.
ICPRICPR-v1-2004-HoriSNK #detection #multi #realtime #using
A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
ICPRICPR-v1-2004-HseN #recognition #sketching #using
Sketched Symbol Recognition using Zernike Moments (HHH, ARN), pp. 367–370.
ICPRICPR-v1-2004-KavallieratouS #using
Discrimination of Machine-Printed from Handwritten Text Using Simple Structural Characteristics (EK, ES), pp. 437–440.
ICPRICPR-v1-2004-KimYL #algorithm #distance #graph #relational #using
A New Attributed Relational Graph Matching Algorithm Using the Nested Structure of Earth Mover’s Distance (DHK, IDY, SUL), pp. 48–51.
ICPRICPR-v1-2004-LebrunCC #reduction #using
SVM Training Time Reduction using Vector Quantization (GL, CC, HC), pp. 160–163.
ICPRICPR-v1-2004-LeL #image #markov #modelling #using
Recognizing Frontal Face Images Using Hidden Markov Models with One Training Image per Person (HSL, HL), pp. 318–321.
ICPRICPR-v1-2004-LiBS #image #recognition #using
Object Class Recognition using Images of Abstract Regions (YL, JAB, LGS), pp. 40–43.
ICPRICPR-v1-2004-LiHS #feature model #image #programming #retrieval #search-based #semantics #using
Semantic Feature Extraction Using Genetic Programming in Image Retrieval (QL, HH, ZS), pp. 648–651.
ICPRICPR-v1-2004-NakamuraHFS #image #parallel #using
Fingerprint Image Enhancement using a Parallel Ridge Filter (TN, MH, HF, KS), pp. 536–539.
ICPRICPR-v1-2004-NaroditskyD #3d #using
3D Scanning Using Spatiotemporal Orientation (ON, KD), pp. 5–9.
ICPRICPR-v1-2004-OnishiF #comprehension #evaluation #image #using #video
Shooting the Lecture Scene Using Computer-controlled Cameras Based on Situation Understanding and Evaluation of Video Images (MO, KF), pp. 781–784.
ICPRICPR-v1-2004-ParkL #distance #fault #identification #image #using
Enhancing Low-Resolution Facial Images Using Error Back-Projection for Human Identification at a Distance (JSP, SWL), pp. 346–349.
ICPRICPR-v1-2004-RahtuSH #multi #recognition #using
Convexity Recognition Using Multi-Scale Autoconvolution (ER, MS, JH), pp. 692–695.
ICPRICPR-v1-2004-ShiG #documentation #image #normalisation #using
Historical Document Image Enhancement Using Background Light Intensity Normalization (ZS, VG), pp. 473–476.
ICPRICPR-v1-2004-SirisathitkulAU #distance #image #performance #using
Fast Color Image Quantization using Squared Euclidean Distance of Adjacent Color Points along the Highest Color Variance Axis (YS, SA, BU), pp. 656–659.
ICPRICPR-v1-2004-TodorovicN #detection #image #using
Detection of Artificial Structures in Natural-Scene Images Using Dynamic Trees (ST, MCN), pp. 35–39.
ICPRICPR-v1-2004-TominagaTK #estimation #multi #using
Estimation of Surface Properties of Art Paintings Using a Multi-band Camera (ST, NT, TK), pp. 92–95.
ICPRICPR-v1-2004-TremblaySM #algorithm #multi #nearest neighbour #optimisation #random #search-based #using
Optimizing Nearest Neighbour in Random Subspaces using a Multi-Objective Genetic Algorithm (GT, RS, PM), p. 208.
ICPRICPR-v1-2004-TsuiTC #image #metric #using
Metric Measurement on Arbitrary Planes in 2 Images Using the Conformal Point (PTT, HTT, WkC), pp. 108–111.
ICPRICPR-v1-2004-ValienteACG #design #image #using
Structural Description of Textile and Tile Pattern Designs Using Image Processing (JMV, FA, CC, JMG), pp. 498–503.
ICPRICPR-v1-2004-Wakahara #adaptation #correlation #modelling #normalisation #using
Adaptive Normalization of Handwritten Characters Using GAT Correlation and Mixture Models (TW), pp. 393–396.
ICPRICPR-v1-2004-WangA #composition #multi #representation #using
Compact Representation of Multidimensional Data Using Tensor Rank-One Decomposition (HW, NA), pp. 44–47.
ICPRICPR-v1-2004-WangJW #approach #detection #integration #multi #novel #using #video
A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
ICPRICPR-v1-2004-YangFTH #detection #multi #using
Skin Color Detection Using Multiple Cues (JY, ZF, TT, WH), pp. 632–635.
ICPRICPR-v2-2004-BaiH04a #detection #documentation #image #multi #using
Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
ICPRICPR-v2-2004-BanerjeeKM #detection #using
Corner Detection Using Support Vector Machines (MB, MKK, PM), pp. 819–822.
ICPRICPR-v2-2004-BeginF #approach #using
Blind Super-Resolution Using a Learning-Based Approach (IB, FPF), pp. 85–89.
ICPRICPR-v2-2004-BeierholmB #music #speech #using
Speech Music Discrimination Using Class-Specific Features (TB, PMB), pp. 379–382.
ICPRICPR-v2-2004-CaetanoCB #algorithm #comparison #distance #metric #using
A Comparison of Junction Tree and Relaxation Algorithms for Point Matching using Different Distance Metrics (TSC, TC, DACB), pp. 124–127.
ICPRICPR-v2-2004-Clocksin #order #recognition #using
Handwritten Syriac Character Recognition using Order Structure Invariance (WFC), pp. 562–565.
ICPRICPR-v2-2004-DengC #image #implementation #segmentation #using
Unsupervised Image Segmentation Using A Simple MRF Model with A New Implementation Scheme (HD, DAC), pp. 691–694.
ICPRICPR-v2-2004-EngWKY #detection #framework #robust #using
A Bayesian Framework for Robust Human Detection and Occlusion Handling using Human Shape Model (HLE, JW, AHK, WYY), pp. 257–260.
ICPRICPR-v2-2004-FarmerBJ #feature model #random #scalability #using
Large Scale Feature Selection Using Modified Random Mutation Hill Climbing (MEF, SB, AKJ), pp. 287–290.
ICPRICPR-v2-2004-FayolleRT #3d #algorithm #modelling #re-engineering #search-based #using
3D Shape Reconstruction of Template Models Using Genetic Algorithms (PAF, CR, CT), pp. 269–272.
ICPRICPR-v2-2004-FritzPB #information management #recognition #using
Object Recognition Using Local Information Content (GF, LP, HB), pp. 15–18.
ICPRICPR-v2-2004-GaoHBW #analysis #markov #process #using
Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
ICPRICPR-v2-2004-GritaiSS #analysis #invariant #on the
On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
ICPRICPR-v2-2004-HuR #classification #clustering #probability #using
Probability Table Compression Using Distributional Clustering for Scanning N-Tuple Classifiers (JH, ER), pp. 533–536.
ICPRICPR-v2-2004-Ikeda #approximate #re-engineering #using
An Accurate Shape Reconstruction from Photometric Stereo Using Four Approximations of Surface Normal (OI), pp. 220–223.
ICPRICPR-v2-2004-IurgelR #classification #documentation #probability #using
Spoken Document Classification with SVMs Using Linguistic Unit Weighting and Probabilistic Couplers (UI, GR), pp. 667–670.
ICPRICPR-v2-2004-KaratzasA #image #segmentation #using #web
Text Extraction from Web Images Based on A Split-and-Merge Segmentation Method Using Colour Perception (DK, AA), pp. 634–637.
ICPRICPR-v2-2004-KimBSCCKC #image #using #verification
Scene Text Extraction in Natural Scene Images using Hierarchical Feature Combining and Verification (KCK, HRB, YJS, YWC, SYC, KKK, YC), pp. 679–682.
ICPRICPR-v2-2004-KimuraKK #image #multi #retrieval #similarity #using
Acceleration of Similarity-Based Partial Image Retrieval using Multistage Vector Quantization (AK, TK, KK), pp. 993–996.
ICPRICPR-v2-2004-LindeL #higher-order #recognition #using
Object Recognition Using Composed Receptive Field Histograms of Higher Dimensionality (OL, TL), pp. 1–6.
ICPRICPR-v2-2004-LinYL #analysis #incremental #using
Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
ICPRICPR-v2-2004-LiuLW #using
Free Form Shape Matching Using Deterministic Annealing and Softassign (YL, LL, YW), pp. 128–131.
ICPRICPR-v2-2004-LourakisAM #approach #graph #information management #similarity #using
A Graph-Based Approach to Corner Matching Using Mutual Information as a Local Similarity Measure (MIAL, AAA, KM), pp. 827–830.
ICPRICPR-v2-2004-MachadoMC #adaptation #clustering #image #using
The Influence of the Noise in the Restoration of Solar Radio Images using Adaptive Regularization Techniques Based on Clustering (WRSM, NDAM, JERC), pp. 371–374.
ICPRICPR-v2-2004-MaD #adaptation #classification #using #word
Adaptive Word Style Classification Using a Gaussian Mixture Model (HM, DSD), pp. 606–609.
ICPRICPR-v2-2004-MozaffarifK #classification #comparison #recognition #using
Feature Comparison between Fractal Codes and Wavelet Transform in Handwritten Alphanumeric Recognition Using SVM Classifier (SM, KF, HRK), pp. 331–334.
ICPRICPR-v2-2004-OhteraH #identification #using
Faxed Form Identification using Histogram of the Hough-Space (RO, TH), pp. 566–569.
ICPRICPR-v2-2004-OudotPMM #adaptation #concept #online #recognition #self #using
Self-Supervised Writer Adaptation using Perceptive Concepts: Application to On-Line Text Recognition (LO, LP, AM, MM), pp. 598–601.
ICPRICPR-v2-2004-QuanZ #adaptation #using
Perceptual Criterion Based Fragile Audio Watermarking Using Adaptive Wavelet Packets (XQ, HZ), pp. 867–870.
ICPRICPR-v2-2004-Rodriguez-DamianCFS #classification #using
Pollen Classification using Brightness-Based and Shape-Based Descriptors (MRD, EC, AF, PdSO), pp. 212–215.
ICPRICPR-v2-2004-SahaDC #metric #using
CBIR using Perception based Texture and Colour Measures (SKS, AKD, BC), pp. 985–988.
ICPRICPR-v2-2004-SantamariaBS #analysis #statistics #using
Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
ICPRICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online #using
Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
ICPRICPR-v2-2004-SchlapbachB #identification #using
Off-line Handwriting Identification Using HMM Based Recognizers (AS, HB), pp. 654–658.
ICPRICPR-v2-2004-SenerG #analysis #component #independence #using
Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
ICPRICPR-v2-2004-SerbyKG #multi #probability #using
Probabilistic Object Tracking Using Multiple Features (DS, EKM, LJVG), pp. 184–187.
ICPRICPR-v2-2004-ShihL #analysis #detection #using #video
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
ICPRICPR-v2-2004-SuW #normalisation #using
Decomposing Chinese Characters into Stroke Segments Using SOGD Filters and Orientation Normalization (YMS, JFW), pp. 351–354.
ICPRICPR-v2-2004-TahirBKA #classification #feature model #using
Feature Selection using Tabu Search for Improving the Classification Rate of Prostate Needle Biopsies (MAT, AB, FK, AA), pp. 335–338.
ICPRICPR-v2-2004-ToyozumiYMKMST #case study #recognition #segmentation #using
A Study of Symbol Segmentation Method for Handwritten Mathematical Formula Recognition using Mathematical Structure Information (KT, NY, KM, TK, KM, YS, TT), pp. 630–633.
ICPRICPR-v2-2004-VargaB04a #recognition #using
Off-line Handwritten Textline Recognition Using a Mixture of Natural and Synthetic Training Data (TV, HB), pp. 545–549.
ICPRICPR-v2-2004-VillegerAB #image #probability #using
Image Disocclusion Using a Probabilistic Gradient Orientation (EV, GA, LBF), pp. 52–55.
ICPRICPR-v2-2004-Yang #using
Sammon’s Nonlinear Mapping Using Geodesic Distances (LY), pp. 303–306.
ICPRICPR-v2-2004-YuXA #graph #sequence #using #video
Reconstructing a Dynamic Surface from Video Sequences Using Graph Cuts in 4D Space-Time (TY, NX, NA), pp. 245–248.
ICPRICPR-v2-2004-ZhangLG #detection #realtime #using
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces (DZ, SZL, DGP), pp. 411–414.
ICPRICPR-v2-2004-ZhengZZ #realtime #recognition #using
Real-Time Face Recognition Using Gram-Schmidt Orthogonalization for LDA (WZ, CZ, LZ), pp. 403–406.
ICPRICPR-v2-2004-ZiouB #analysis #finite #image #learning #using
Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
ICPRICPR-v3-2004-BadawyK #retrieval #using
Shape Retrieval using Concavity Trees (OEB, MK), pp. 111–115.
ICPRICPR-v3-2004-BagciAKC #eye tracking #markov #modelling #using
Eye Tracking Using Markov Models (AMB, RA, AAK, EC), pp. 818–821.
ICPRICPR-v3-2004-BaiYH #graph #using
Graph Matching using Spectral Embedding and Alignment (XB, HY, ERH), pp. 398–401.
ICPRICPR-v3-2004-BarnardO #adaptation #robust #segmentation #using
Robust Playfield Segmentation using MAP Adaptation (MB, JMO), pp. 610–613.
ICPRICPR-v3-2004-BoccignoneCMP #segmentation #using #video
Using Attention for Video Segmentation (GB, AC, VM, AP), pp. 838–841.
ICPRICPR-v3-2004-CarneiroJ #using
Pruning Local Feature Correspondences Using Shape Context (GC, ADJ), pp. 16–19.
ICPRICPR-v3-2004-ChenB #3d #image #recognition #using
3D Free-Form Object Recognition in Range Images Using Local Surface Patches (HC, BB), pp. 136–139.
ICPRICPR-v3-2004-DavidL #search-based #using
Signal Discrimination Using a Support Vector Machine for Genetic Syndrome Diagnosis (AD, BL), pp. 490–493.
ICPRICPR-v3-2004-FaragEGF #detection #recognition #using
Detection and Recognition of Lung Abnormalities Using Deformable Templates (AAF, AEB, GLG, RF), pp. 738–741.
ICPRICPR-v3-2004-FurukawaKMSMT #3d #approximate #estimation #image #physics #using
Spine Posture Estimation Method from Human Images Using 3D Spine Model — Computation of the rough approximation of the physical forces working on vertebral bodies (DF, TK, KM, YS, KM, TT), pp. 322–325.
ICPRICPR-v3-2004-FusseneggerOPA #detection #recognition #segmentation #using
Object Recognition Using Segmentation for Feature Detection (MF, AO, AP, PA), pp. 41–44.
ICPRICPR-v3-2004-GoriMS #graph #random #using
Graph matching using Random Walks (MG, MM, LS), pp. 394–397.
ICPRICPR-v3-2004-HardingE #fourier #gesture #using
Recognizing Hand Gesture using Fourier Descriptors (PRGH, TJE), pp. 286–289.
ICPRICPR-v3-2004-HautamakiKF #detection #graph #nearest neighbour #using
Outlier Detection Using k-Nearest Neighbour Graph (VH, IK, PF), pp. 430–433.
ICPRICPR-v3-2004-HuangMP #hybrid #markov #random #recognition #using
A Hybrid Face Recognition Method using Markov Random Fields (RH, DNM, VP), pp. 157–160.
ICPRICPR-v3-2004-IrnigerB #database #graph #using
Graph Database Filtering Using Decision Trees (CI, HB), pp. 383–388.
ICPRICPR-v3-2004-IshiiO #3d #using
Perfect Perspective Projection using a Varifocal Mirror and Its Application to Three-Dimensional Close-Up Imaging (AI, RO), pp. 270–273.
ICPRICPR-v3-2004-JagmohanSA #estimation #kernel #using
Dense Stereo Matching Using Kernel Maximum Likelihood Estimation (AJ, MKS, NA), pp. 28–31.
ICPRICPR-v3-2004-KawanishiKKT #adaptation #algorithm #performance #using
A Fast Template Matching Algorithm with Adaptive Skipping Using Inner-Subtemplates’ Distances (TK, TK, KK, ST), pp. 654–657.
ICPRICPR-v3-2004-KuhlKWK #classification #using
Training of Classifiers Using Virtual Samples Only (AK, LK, CW, UK), pp. 418–421.
ICPRICPR-v3-2004-LanMZ #detection #multimodal #using
Multi-level Anchorperson Detection Using Multimodal Association (DJL, YFM, HZ), pp. 890–893.
ICPRICPR-v3-2004-LiH #recognition #using
Face Recognition using Shading-Based Curvature Attributes (YL, ERH), pp. 538–541.
ICPRICPR-v3-2004-MaPH #recognition #using
Using B-Spline Curves for Hand Recognition (YM, FEP, WTH), pp. 274–277.
ICPRICPR-v3-2004-MatsuiCUM #markov #monte carlo #recognition #using
Bayesian Face Recognition using a Markov Chain Monte Carlo Method (AM, SC, FU, TM), pp. 918–921.
ICPRICPR-v3-2004-McCallT #analysis #invariant #using
Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
ICPRICPR-v3-2004-MoW #modelling #segmentation #using #video
Video Modelling and Segmentation Using Gaussian Mixture Models (XM, RW), pp. 854–857.
ICPRICPR-v3-2004-NaderiMC #algorithm #image #optimisation #using #verification
1D-HMM for Face Verification: Model Optimization Using Improved Algorithm and Intelligent Selection of Training Images (SN, MSM, NMC), pp. 330–333.
ICPRICPR-v3-2004-NaganumaTMM #analysis #using
Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
ICPRICPR-v3-2004-NakaiTHOO #detection
A Practical Stereo Scheme for Obstacle Detection in Automotive Use (HN, NT, HH, YO, KO), pp. 346–350.
ICPRICPR-v3-2004-NishiF #analysis #using #video
Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
ICPRICPR-v3-2004-NovakLCMAHA #analysis #markov #modelling #using
Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
ICPRICPR-v3-2004-PalenichkaMZ #image #locality #multi #performance #using
Fast Object Localization using Multi-Scale Image Relevance Function (RMP, RM, MBZ), pp. 227–230.
ICPRICPR-v3-2004-Pernkopf #3d #using
3D Surface Inspection using Coupled HMMs (FP), pp. 223–226.
ICPRICPR-v3-2004-RamstromC #detection #using
Object Detection using Background Context (OR, HIC), pp. 45–48.
ICPRICPR-v3-2004-ReiterR #classification #multi #programming #segmentation #using
Segmentation and Classification of Meeting Events using Multiple Classifier Fusion and Dynamic Programming (SR, GR), pp. 434–437.
ICPRICPR-v3-2004-SalbergH #estimation #segmentation #using
Object Segmentation and Feature Estimation Using Shadows (ABS, AH), pp. 674–678.
ICPRICPR-v3-2004-SatakeS #multi #using
Multiple Target Tracking by Appearance-Based Condensation Tracker using Structure Information (JS, TS), pp. 294–297.
ICPRICPR-v3-2004-ShanWQT #gesture #recognition #using
Gesture Recognition Using Temporal Template Based Trajectories (CS, YW, XQ, TT), pp. 954–957.
ICPRICPR-v3-2004-SkerlLP #evaluation #metric #similarity
Evaluation of Nine Similarity Measures Used in Rigid Registration (DS, BL, FP), pp. 794–797.
ICPRICPR-v3-2004-SolemH #using
Estimating Surface Shape and Extending Known Structure using Specular Reflections (JES, AH), pp. 173–176.
ICPRICPR-v3-2004-SotocaPK #image #multi #using
Unsupervised Band Selection for Multispectral Images using Information Theory (JMS, FP, ACK), pp. 510–513.
ICPRICPR-v3-2004-SotocaSP #multi #naive bayes #set #using
Attribute Relevance in Multiclass Data Sets Using the Naive Bayes Rule (JMS, JSS, FP), pp. 426–429.
ICPRICPR-v3-2004-SugimotoTTO #detection #image #sequence #using #visualisation
Obstacle Detection Using Millimeter-Wave Radar and Its Visualization on Image Sequence (SS, HT, HT, MO), pp. 342–345.
ICPRICPR-v3-2004-UmedaGR #constraints #image #using
Registration of Range and Color Images Using Gradient Constraints and Range Intensity Images (KU, GG, MR), pp. 12–15.
ICPRICPR-v3-2004-VosBASMVV #statistics #using
A Statistical Shape Model without Using Landmarks (FV, PWdB, JGMA, GJS, MM, LJvV, AMV), pp. 714–717.
ICPRICPR-v3-2004-WuZZ #feature model #linear #using
Relevant Linear Feature Extraction Using Side-information and Unlabeled Data (FW, YZ, CZ), pp. 582–585.
ICPRICPR-v3-2004-ZhangM #recognition #using
Recognition of Expression Variant Faces Using Weighted Subspaces (YZ, AMM), pp. 149–152.
ICPRICPR-v4-2004-ArnabatCM #3d #consistency #modelling #multi #sequence #using
3D Modeling from Turntable Sequences Using Dense Stereo Carving and Multi-View Consistency (JA, SC, GGM), pp. 36–39.
ICPRICPR-v4-2004-BelkhoucheQGJ #2d #image #using
Binary Image Transformation Using Two-Dimensional Chaotic Maps (FB, UQ, IG, DJ), pp. 823–826.
ICPRICPR-v4-2004-BhanuZ #recognition #using
Face Recognition from Face Profile Using Dynamic Time Warping (BB, XZ), pp. 499–502.
ICPRICPR-v4-2004-BoubchirFB #approximate #using
Bayesian Denoising in the Wavelet-Domain Using an Analytical Approximate a-Stable Prior (LB, MJF, DB), pp. 889–892.
ICPRICPR-v4-2004-BradleyL #estimation #using
Sample Size Estimation using the Receiver Operating Characteristic Curve (APB, IDL), pp. 428–431.
ICPRICPR-v4-2004-ChanHSP #detection #semantics #using #video
Detecting Rare Events in Video Using Semantic Primitives with HMM (MTC, AH, JS, MP), pp. 150–154.
ICPRICPR-v4-2004-CongEPB #equation #morphism #using
Shape Metamorphism using p-Laplacian Equation (GC, ME, BP, GB), pp. 15–18.
ICPRICPR-v4-2004-CriminisiS #comparison
Did the great masters use optical projections while painting? Perspective Comparison of Paintings and Photographs of Renaissance Chandeliers (AC, DGS), pp. 645–648.
ICPRICPR-v4-2004-DebiollesOA #network
Combined Use of Partial Least Squares Regression and Neural Network for Diagnosis Tasks (AD, LO, PA), pp. 573–576.
ICPRICPR-v4-2004-DehaisDMC #artificial reality #perspective #realtime #sequence #using #video
Augmented Reality through Real-Time Tracking of Video Sequences Using a Panoramic View (CD, MD, GM, VC), pp. 995–998.
ICPRICPR-v4-2004-DharaC #approach #estimation #hybrid #predict #using #video
Video Motion Estimation Using Prediction Based Hybrid Approach (BCD, BC), pp. 737–740.
ICPRICPR-v4-2004-FabletJB #automation #estimation #image #learning #statistics #using
Automatic Fish Age Estimation from Otolith Images using Statistical Learning (RF, NLJ, AB), pp. 503–506.
ICPRICPR-v4-2004-FanL #image #using #verification
The Using of Thermal Images of Palm-dorsa Vein-patterns for Biometric Verification (KCF, CLL), pp. 450–453.
ICPRICPR-v4-2004-FigueroaLBCM #graph #representation #using
Tracking Soccer Players using the Graph Representation (PJF, NJL, RMLB, IC, GGM), pp. 787–790.
ICPRICPR-v4-2004-FuYHT #clustering #detection #multi #using
Mixture Clustering Using Multidimensional Histograms for Skin Detection (ZF, JY, WH, TT), pp. 549–552.
ICPRICPR-v4-2004-GaoA #parallel #using
Single Camera Stereo using Planar Parallel Plate (CG, NA), pp. 108–111.
ICPRICPR-v4-2004-Gong #estimation #programming #using
Motion Estimation using Dynamic Programming with Selective Path Search (MG), pp. 203–206.
ICPRICPR-v4-2004-HagaSY #analysis #detection #using
Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
ICPRICPR-v4-2004-HanafiahYNK #comprehension #using
Understanding Inexplicit Utterances Using Vision for Helper Robots (ZMH, CY, AN, YK), pp. 925–928.
ICPRICPR-v4-2004-HaritC #using #video
Video Shot Interpretation using Principles of Perceptual Prominence and Perceptual Grouping in Spatio-Temporal Domain (GH, SC), pp. 256–259.
ICPRICPR-v4-2004-HottaKM #category theory #nearest neighbour #pattern matching #pattern recognition #recognition #using
Pattern Recognition Using Average Patterns of Categorical k-Nearest Neighbors (SH, SK, SM), pp. 412–415.
ICPRICPR-v4-2004-IrfanogluGA #3d #automation #recognition #using
3D Shape-based Face Recognition using Automatically Registered Facial Surfaces (MOI, BG, LA), pp. 183–186.
ICPRICPR-v4-2004-KangCM #invariant #using
Object Reacquisition Using Invariant Appearance Model (JK, IC, GGM), pp. 759–762.
ICPRICPR-v4-2004-KimP #hypermedia #using
Geographic Hypermedia using Search Space Transformation (SSK, JHP), pp. 368–371.
ICPRICPR-v4-2004-KimPL #bound #using
Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
ICPRICPR-v4-2004-KobayashiO #higher-order #identification #multi #polynomial #using
Action and Simultaneous Multiple-Person Identification Using Cubic Higher-Order Local Auto-Correlation (TK, NO), pp. 741–744.
ICPRICPR-v4-2004-KrichenMGD #identification #using
Iris Identification Using Wavelet Packets (EK, MAM, SGS, BD), pp. 335–338.
ICPRICPR-v4-2004-LiuSCH #clustering #personalisation #using #verification
Personalized Face Verification System Using Owner-Specific Cluster-Dependent LDA-Subspace (HCL, CHS, YHC, YPH), pp. 344–347.
ICPRICPR-v4-2004-Lopez-FrancoB #algebra #framework #geometry #using
Unified Model for Omnidirectional Vision Using the Conformal Geometric Algebra Framework (CLF, EBC), pp. 48–51.
ICPRICPR-v4-2004-MaityK #image #using
An Image Watermarking Scheme using HVS Characteristics and Spread Transform (SPM, MKK), pp. 869–872.
ICPRICPR-v4-2004-McKennaN #learning #using
Learning Spatial Context from Tracking using Penalised Likelihoods (SJM, HNC), pp. 138–141.
ICPRICPR-v4-2004-MurakitaII #markov #monte carlo #using
Human Tracking using Floor Sensors based on the Markov Chain Monte Carlo Method (TM, TI, HI), pp. 917–920.
ICPRICPR-v4-2004-NakamuraFTMYMTI #image #recognition #using
Eigen Nodule: View-Based Recognition of Lung Nodule in Chest X-ray CT Images Using Subspace Method (YN, GF, HT, SM, SY, TM, YT, TI), pp. 681–684.
ICPRICPR-v4-2004-NumadaNKKT #image #polynomial #using
Sharpening of CT Images by Cubic Interpolation using B-Spline (MN, TN, KK, HK, HT), pp. 701–704.
ICPRICPR-v4-2004-OuMF #classification #multi #network #using
Multiclass Pattern Classification Using Neural Networks (GO, YLM, LAF), pp. 585–588.
ICPRICPR-v4-2004-OyekoyaS #behaviour #using #visual notation
Exploring Human Eye Behaviour using a Model of Visual Attention (OO, FS), pp. 945–948.
ICPRICPR-v4-2004-PeursumBVW #segmentation
Human Action Segmentation via Controlled Use of Missing Data in HMMs (PP, HHB, SV, GAWW), pp. 440–445.
ICPRICPR-v4-2004-PrasadSK #image #set #using
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images (MNP, AS, IK), pp. 515–518.
ICPRICPR-v4-2004-SangiHS #analysis #difference #metric #using
Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
ICPRICPR-v4-2004-SatoKYI #interface #using
An Immersive Telepresence System with a Locomotion Interface Using High-Resolution Omnidirectional Movies (SI, TS, MK, NY), pp. 396–399.
ICPRICPR-v4-2004-StevensSEM #navigation #using
Motion Imagery Navigation Using Terrain Estimates (MRS, MS, RSE, JCM), pp. 272–275.
ICPRICPR-v4-2004-SungLPL #bound #locality #recognition #using
Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
ICPRICPR-v4-2004-TaguchiOA #performance #using #visual notation
Fast Visual Search Using Simplified Pruning Rules — Streamlined Active Search (ST, SO, HA), pp. 937–940.
ICPRICPR-v4-2004-TanakaOKK #locality #mobile #probability #using
Probabilistic Localization for Mobile Robots using Incomplete Maps (KT, NO, EK, YK), pp. 709–712.
ICPRICPR-v4-2004-TanCZ #image #kernel #metric #robust #using
Robust Image Denoising Using Kernel-Induced Measures (KT, SC, DZ), pp. 685–688.
ICPRICPR-v4-2004-TothSWA #clustering #detection #using
Detection of Moving Shadows using Mean Shift Clustering and a Significance Test (DT, IS, AW, TA), pp. 260–263.
ICPRICPR-v4-2004-WallhoffZRP #using
Face Tracking in Meeting Room Scenarios Using Omnidirectional Views (FW, MZ, GR, IP), pp. 933–936.
ICPRICPR-v4-2004-WuWZ #energy #recognition #using
Palmprint Recognition Using Directional Line Energy Feature (XW, KW, DZ), pp. 475–478.
ICPRICPR-v4-2004-XuTAA #generative #graph #image #using
Generating Omnifocus Images Using Graph Cuts and a New Focus Measure (NX, KHT, HA, NA), pp. 697–700.
ICPRICPR-v4-2004-YamamotoYS #gesture #interface #using
Arm-Pointing Gesture Interface Using Surrounded Stereo Cameras System (YY, IY, KS), pp. 965–970.
ICPRICPR-v4-2004-YingH04a #detection #using
Catadioptric Line Features Detection using Hough Transform (XY, ZH), pp. 839–842.
ICPRICPR-v4-2004-ZaveriMD #image #information retrieval #modelling #multi #sequence #using
Tracking of Point Targets in IR Image Sequence using Multiple Model Based Particle Filtering and MRF Based Data Association (MAZ, SNM, UBD), pp. 729–732.
ICPRICPR-v4-2004-ZhaiRS #detection #finite #state machine #using
Conversation Detection in Feature Films Using Finite State Machines (YZ, ZR, MS), pp. 458–461.
ICPRICPR-v4-2004-ZhangLT #analysis #image #recognition #using #word
Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
ICPRICPR-v4-2004-ZhouWG #estimation #using
Tracking Periodic Motion using Bayesian Estimation (HZ, AMW, PRG), pp. 725–728.
KDDKDD-2004-AliS #architecture #collaboration #distributed #named #recommendation #using
TiVo: making show recommendations using a distributed collaborative filtering architecture (KA, WvS), pp. 394–401.
KDDKDD-2004-JaroszewiczS #network #using
Interestingness of frequent itemsets using Bayesian networks as background knowledge (SJ, DAS), pp. 178–186.
KDDKDD-2004-MorinagaY #finite #roadmap #topic #using
Tracking dynamics of topic trends using a finite mixture model (SM, KY), pp. 811–816.
KDDKDD-2004-TruongLB #dataset #learning #random #using
Learning a complex metabolomic dataset using random forests and support vector machines (YT, XL, CB), pp. 835–840.
KDDKDD-2004-WuGH #clustering #mining #network #using
Mining scale-free networks using geodesic clustering (AYW, MG, JH), pp. 719–724.
KDDKDD-2004-ZhaoLTS #coordination #design #named #parallel #testing #using
V-Miner: using enhanced parallel coordinates to mine product design and test data (KZ, BL, TMT, AS), pp. 494–502.
KRKR-2004-AmgoudC #on the
On the Use of an ATMS for Handling Conflicting Desires (LA, CC), pp. 194–202.
LSOLSO-2004-FalboRBT #how #learning #risk management #using
Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
SEKESEKE-2004-CostagliolaFGTV #development #predict #using #web
Using COSMIC-FFP for Predicting Web Application Development Effort (GC, FF, CG, GT, GV), pp. 439–444.
SEKESEKE-2004-Cruz-LemusGORP #diagrams #fuzzy #predict #statechart #uml #using
Predicting UML Statechart Diagrams Understandability Using Fuzzy Logic-Based Techniques (JACL, MG, JAO, FPR, MP), pp. 238–245.
SEKESEKE-2004-CubraniM #automation #categorisation #debugging #using
Automatic bug triage using text categorization (DC, GCM), pp. 92–97.
SEKESEKE-2004-GermanHJ #evolution #using #visualisation
Visualizing the evolution of software using softChange (DMG, AH, NJ), pp. 336–341.
SEKESEKE-2004-GomesPCPSFB #composition #diagrams #reuse #uml #using
Reuse of UML Class Diagrams Using Case-Based Composition (PG, FCP, PC, PP, NS, JLF, CB), pp. 258–263.
SEKESEKE-2004-Hobbs #design pattern #specification #using
Using A Scenario Specification Language to Add Context to Design Patterns (RLH), pp. 330–335.
SEKESEKE-2004-JahnkeB #architecture #clustering #reverse engineering #using
Reverse Engineering Software Architecture using Rough Clusters (JHJ, YB), pp. 270–275.
SEKESEKE-2004-LiLCWL #using
Extracting Minimal Non-Redundant Implication Rules by Using Quantized Closed Itemset Lattice (YL, ZL, WC, QW, WL), pp. 402–405.
SEKESEKE-2004-SubramaniamLFE #case study #development #generative #named
UCDA: Use Case Driven Development Assistant Tool for Class Model Generation (KS, DL, BHF, AE), pp. 324–329.
SEKESEKE-2004-WeigangCDM #distributed #grid #knowledge base #realtime #using
Distributed Knowledge Based System Using Grid Computing for Real Time Air Traffic Synchronization — ATFMGC (WL, DAC, MVPD, ACMAdM), pp. 396–401.
SEKESEKE-2004-WihartoS #logic #using #xml
Future Proofing and Retargeting Application Logic Using O2XML (MW, PS), pp. 173–178.
SIGIRSIGIR-2004-AmitayCLS #evaluation #scalability #set #using
Scaling IR-system evaluation using term relevance sets (EA, DC, RL, AS), pp. 10–17.
SIGIRSIGIR-2004-BellGL #challenge #using
Challenges in using lifetime personal information stores (GB, JG, RL), p. 1.
SIGIRSIGIR-2004-Cowans #information retrieval #process #using
Information retrieval using hierarchical dirichlet processes (PJC), pp. 564–565.
SIGIRSIGIR-2004-DiazJ #precise #predict #query #using
Using temporal profiles of queries for precision prediction (FD, RJ), pp. 18–24.
SIGIRSIGIR-2004-FanGLX #automation #concept #image #representation #using
Automatic image annotation by using concept-sensitive salient objects for image content representation (JF, YG, HL, GX), pp. 361–368.
SIGIRSIGIR-2004-GreevyS #using
Classifying racist texts using a support vector machine (EG, AFS), pp. 468–469.
SIGIRSIGIR-2004-GuL #comparison #documentation #feedback #information retrieval #using
Comparison of using passages and documents for blind relevance feedback in information retrieval (ZG, ML), pp. 482–483.
SIGIRSIGIR-2004-KimCK #dependence #documentation #using
Refining term weights of documents using term dependencies (HSK, IC, MK), pp. 552–553.
SIGIRSIGIR-2004-KimSR #approach #information retrieval #using #word
Information retrieval using word senses: root sense tagging approach (SBK, HCS, HCR), pp. 258–265.
SIGIRSIGIR-2004-LiuC #clustering #modelling #retrieval #using
Cluster-based retrieval using language models (XL, WBC), pp. 186–193.
SIGIRSIGIR-2004-MaS #information management #using
Information extraction using two-phase pattern discovery (LM, JS), pp. 534–535.
SIGIRSIGIR-2004-MladenicBGM #classification #feature model #interactive #linear #modelling #using
Feature selection using linear classifier weights: interaction with classification models (DM, JB, MG, NMF), pp. 234–241.
SIGIRSIGIR-2004-Ogilvie #comprehension #generative #information retrieval #modelling #probability #using
Understanding combination of evidence using generative probabilistic models for information retrieval (abstract only) (PO), p. 603.
SIGIRSIGIR-2004-PlachourasO #topic
Usefulness of hyperlink structure for query-biased topic distillation (VP, IO), pp. 448–455.
SIGIRSIGIR-2004-Zhang #adaptation #classification #using
Using bayesian priors to combine classifiers for adaptive filtering (YZ0), pp. 345–352.
SIGIRSIGIR-2004-ZhangPZ #machine learning #recognition #using
Focused named entity recognition using machine learning (LZ, YP, TZ), pp. 281–288.
SIGIRSIGIR-2004-ZhangV #automation #information retrieval #using #web
Using the web for automated translation extraction in cross-language information retrieval (YZ, PV), pp. 162–169.
UMLUML-2004-DologN #collaboration #diagrams #feature model #modelling #uml #using
Using UML-based Feature Models and UML Collaboration Diagrams to Information Modelling for Web-Based Applications (PD, WN), pp. 425–439.
UMLUML-2004-DuranBGP #case study #empirical #evolution #metamodelling
Empirically Driven Use Case Metamodel Evolution (AD, BB, MG, MP), pp. 1–11.
UMLUML-2004-GoniE #concurrent #ocl #precise #uml #using
Building Precise UML Constructs to Model Concurrency Using OCL (AG, YE), pp. 212–225.
ECOOPECOOP-2004-SillitoDEV #case study
Use Case Level Pointcuts (JS, CD, ADE, KDV), pp. 244–266.
ECOOPECOOP-2004-SutterTD #constraints #java #library #using
Customization of Java Library Classes Using Type Constraints and Profile Information (BDS, FT, JD), pp. 585–610.
ECOOPECOOP-2004-VitenbergKS #concurrent #database #program analysis #using
Increasing Concurrency in Databases Using Program Analysis (RV, KK, AKS), pp. 341–363.
OOPSLAOOPSLA-2004-DincklageD #java
Converting Java classes to use generics (DvD, AD), pp. 1–14.
OOPSLAOOPSLA-2004-DonovanKTE #java #library #source code
Converting java programs to use generic libraries (AD, AK, MST, MDE), pp. 15–34.
GPCEGPCE-2004-SeefriedCK #domain-specific language #embedded #haskell #optimisation #using
Optimising Embedded DSLs Using Template Haskell (SS, MMTC, GK), pp. 186–205.
LOPSTRLOPSTR-2004-Lopez-GarciaBH #analysis #logic programming #source code #using
Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
LOPSTRPDCL-2004-ColvinGHHNS #logic programming #refinement #source code #specification #using
Developing Logic Programs from Specifications Using Stepwise Refinement (RC, LG, IJH, DH, RN, PAS), pp. 66–89.
LOPSTRPDCL-2004-LeuschelCBV #deduction #using
Specialising Interpreters Using Offline Partial Deduction (ML, SJC, MB, WV), pp. 340–375.
PADLPADL-2004-CorreasGCCH #implementation #persistent
A Generic Persistence Model for (C)LP Systems (and Two Useful Implementations) (JC, JMG, MC, DC, MVH), pp. 104–119.
PADLPADL-2004-MoralesCH #c #compilation #prolog #using
Improved Compilation of Prolog to C Using Moded Types and Determinism Information (JFM, MC, MVH), pp. 86–103.
POPLPOPL-2004-GulwaniN #random #using
Global value numbering using random interpretation (SG, GCN), pp. 342–352.
POPLPOPL-2004-SankaranarayananSM #generative #invariant #using
Non-linear loop invariant generation using Gröbner bases (SS, HS, ZM), pp. 318–329.
RERE-2004-KaiyaOK #case study #diagrams #identification
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems (HK, AO, KK), pp. 112–121.
RERE-2004-LaneyBJN #problem #requirements #using
Composing Requirements Using Problem Frames (RCL, LB, MJ, BN), pp. 122–131.
RERE-2004-LinNIJ #bound #problem #security #using
Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
RERE-2004-NurmulianiZW #requirements #sorting #using
Using Card Sorting Technique to Classify Requirements Change (NN, DZ, SPW), pp. 240–248.
RERE-2004-OmasreiterM #case study #process #specification
A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems (HO, EM), pp. 334–339.
RERE-2004-Some #case study #requirements
An Environment for Use Cases based Requirements Engineering (SSS), pp. 364–365.
RERE-2004-VinsenJC #case study #estimation
Use Case Estimation — The Devil is in the Detail (KV, DJ, GC), pp. 10–15.
SACSAC-J-2003-BorgerCR04 #formal method #on the #state machine #uml #using
On formalizing UML state machines using ASM (EB, AC, ER), pp. 287–292.
SACSAC-J-2003-YuNPC04 #on the #testing
On the testing methods used by beginning software testers (YTY, SPN, PLP, TYC), pp. 329–335.
SACSAC-2004-AbulAPB #generative #using
Finding differentially expressed genes: pattern generation using Q-values (OA, RA, FP, KB), pp. 138–142.
SACSAC-2004-Al-SadiA #algorithm #fault tolerance #performance #using
Efficient fault-tolerant routing algorithm for OTIS-cube using unsafety vectors (JAS, AMA), pp. 1426–1430.
SACSAC-2004-AversanoBCET #approach #evolution #process #towards #using
Evolution of business processes towards eBusiness using a critiquing approach (LA, TB, GC, RE, MT), pp. 1351–1358.
SACSAC-2004-BistarelliFO #constraints #detection #modelling #problem #using
Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
SACSAC-2004-BlaserSMJKL #fault #using
Potential prevention of medical errors in casualty surgery by using information technology (RB, MS, DM, PJ, KK, RL), pp. 285–290.
SACSAC-2004-BoughaciD #metaheuristic #optimisation #problem #satisfiability #using
Solving weighted Max-Sat optimization problems using a Taboo Scatter Search metaheuristic (DB, HD), pp. 35–36.
SACSAC-2004-BrowneS #feedback #information retrieval #using #video
Video information retrieval using objects and ostensive relevance feedback (PB, AFS), pp. 1084–1090.
SACSAC-2004-CaldeiraMR #algorithm #hybrid #problem #using
Using a hybrid Evolutionary-Taboo Algorithm to solve Job Shop Problem (JPC, FM, ACR), pp. 1446–1451.
SACSAC-2004-CarvalhoCSBF #mobile #network #security #using
Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
SACSAC-2004-Cebulla #architecture #concept #modelling #using
Modeling sociotechnical specifics using architectural concepts (MC), pp. 1559–1563.
SACSAC-2004-CoutoMS #biology #using #web
Classifying biological articles using web resources (FMC, BM, MJS), pp. 111–115.
SACSAC-2004-IoannidisSSPHM #standard #using #xml
Using XML and related standards to support Location Based Services (AI, MS, PS, GP, SH, LFM), pp. 1629–1633.
SACSAC-2004-KarabudakHB #algorithm #search-based #using
A call admission control scheme using genetic algorithms (DK, CCH, BB), pp. 1151–1158.
SACSAC-2004-KasturiA #clustering #using
Clustering of diverse genomic data using information fusion (JK, RA), pp. 116–120.
SACSAC-2004-Liew #algorithm #search-based #using
Using a genetic algorithm to optimize the gape of a snake jaw (CWL), pp. 975–979.
SACSAC-2004-LosadaDBB #ad hoc #fuzzy #quantifier #retrieval #using
Experiments on using fuzzy quantified sentences in adhoc retrieval (DEL, FDH, AB, SB), pp. 1059–1064.
SACSAC-2004-MarkWC #automation #code generation #modelling #using
Using semi-lagrangian formulations with automatic code generation for environmental modeling (PvdM, LW, GC), pp. 229–234.
SACSAC-2004-MatsushitaKI #distributed #peer-to-peer #using
Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
SACSAC-2004-MichaelsonHS #automaton #bound #named #programming #using
FSM-Hume: programming resource-limited systems using bounded automata (GM, KH, JS), pp. 1455–1461.
SACSAC-2004-PardedeRT #on the #using #xml
On using collection for aggregation and association relationships in XML object-relational storage (EP, JWR, DT), pp. 703–710.
SACSAC-2004-PereiraS #architecture #enterprise #framework #using
A method to define an Enterprise Architecture using the Zachman Framework (CMP, PMAS), pp. 1366–1371.
SACSAC-2004-PinhoT #image #physics #using
Morphing of image represented objects using a physical methodology (RRP, JMRST), pp. 10–15.
SACSAC-2004-RahalP #approach #categorisation #using
An optimized approach for KNN text categorization using P-trees (IR, WP), pp. 613–617.
SACSAC-2004-RamirezS #concurrent #constraints #distributed #logic programming #source code #using
Concurrent and distributed programming using constraint logic programs (RR, AES), pp. 508–509.
SACSAC-2004-SilvaCG #image #using
Diagnosis of lung nodule using Gini coefficient and skeletonization in computerized tomography images (ACS, PCPC, MG), pp. 243–248.
SACSAC-2004-TangMC #embedded #fixpoint #implementation #mobile #performance #using #verification
Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic (TYT, YSM, KCC), pp. 821–825.
SACSAC-2004-VincentR #analysis #framework #using
A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
SACSAC-2004-WeisserK #identification #metric #sequence #statistics #using
Identification of fundamental building blocks in protein sequences using statistical association measures (DKW, JKS), pp. 154–161.
FSEFSE-2004-CabalT #database #metric #sql #testing #using
Using an SQL coverage measurement for testing database applications (MJSC, JT), pp. 253–262.
FSEFSE-2004-DingelL #analysis #automation #concurrent #safety #source code #txl #using
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
FSEFSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
ICSEICSE-2004-BlackMK #modelling #reduction #testing
Bi-Criteria Models for All-Uses Test Suite Reduction (JB, EM, DRK), pp. 106–115.
ICSEICSE-2004-BriandLW #empirical #simulation #statechart #test coverage #using
Using Simulation to Empirically Investigate Test Coverage Criteria Based on Statechart (LCB, YL, YW), pp. 86–95.
ICSEICSE-2004-CervantesH #adaptation #component #using
Autonomous Adaptation to Dynamic Availability Using a Service-Oriented Component Model (HC, RSH), pp. 614–623.
ICSEICSE-2004-ChatterjeeAASV #database #development #using #version control
Using Data Versioning in Database Application Development (RC, GA, SA, BS, RV), pp. 315–325.
ICSEICSE-2004-Jones #fault #locality #using #visualisation
Fault Localization Using Visualization of Test Information (JAJ), pp. 54–56.
ICSEICSE-2004-RyanW #evolution #protocol #using
Using Event-Based Translation to Support Dynamic Protocol Evolution (NDR, ALW), pp. 408–417.
ICSEICSE-2004-TurnerZKRBBBKLR #case study #experience #using #web #web service
Using Web Service Technologies to Create an Information Broker: An Experience Report (MT, FZ, IAK, MR, DB, KHB, PB, JAK, PJL, MR), pp. 552–561.
ICSEICSE-2004-WangR #bytecode #java #slicing #source code #using
Using Compressed Bytecode Traces for Slicing Java Programs (TW, AR), pp. 512–521.
ICSEICSE-2004-ZhangGZ #diagrams #dynamic analysis #order #performance #slicing #using
Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams (XZ, RG, YZ), pp. 502–511.
LDTALDTA-2004-GoldreiS #attribute grammar #formal method #off the shelf #using #verification
Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties (SG, AMS), pp. 33–54.
SPLCSPLC-2004-CzarneckiHE #feature model #modelling #staged #using
Staged Configuration Using Feature Models (KC, SH, UWE), pp. 266–283.
SPLCSPLC-2004-FantechiGLN #case study #product line #verification
A Methodology for the Derivation and Verification of Use Cases for Product Lines (AF, SG, GL, EN), pp. 255–265.
SPLCSPLC-2004-Greenfield04a #domain-specific language #framework #tool support #using
Using Domain-Specific Languages, Patterns, Frameworks, and Tools to Assemble Applications (JG), p. 324.
ASPLOSASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics #using
Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
ASPLOSASPLOS-2004-HuhCBS
Coherence decoupling: making use of incoherence (JH, JC, DB, GSS), pp. 97–106.
CCCC-2004-JohnsonM #memory management #multi #using
Using Multiple Memory Access Instructions for Reducing Code Size (NJ, AM), pp. 265–280.
CCCC-2004-OzerNG #approximate #probability #using
Stochastic Bit-Width Approximation Using Extreme Value Theory for Customizable Processors (, AN, DG), pp. 250–264.
CGOCGO-2004-HuS #using
Using Dynamic Binary Translation to Fuse Dependent Instructions (SH, JES), pp. 213–226.
CGOCGO-2004-RastelloFG #constraints #optimisation #using
Optimizing Translation Out of SSA Using Renaming Constraints (FR, FdF, CG), pp. 265–278.
CGOCGO-2004-WuPSRCA #memory management #profiling #using
Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
HPCAHPCA-2004-EhrhartP #predict #scheduling #using
Reducing the Scheduling Critical Cycle Using Wakeup Prediction (TEE, SJP), pp. 222–231.
HPCAHPCA-2004-KharbutliISL #using
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses (MK, KI, YS, JL), pp. 288–299.
HPCAHPCA-2004-NarayanasamyHSC #convergence #string #using
Creating Converged Trace Schedules Using String Matching (SN, YH, SS, BC), pp. 210–221.
HPCAHPCA-2004-NesbitS #using
Data Cache Prefetching Using a Global History Buffer (KJN, JES), pp. 96–105.
HPCAHPCA-2004-ZhuDDLZC #energy #power management #using
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management (QZ, FMD, CFD, ZL, YZ, PC), pp. 118–129.
HPDCHPDC-2004-HuangS #configuration management #self #using
Building Self-Configuring Services Using Service-Specific Knowledge (ACH, PS), pp. 45–54.
HPDCHPDC-2004-KramerM #grid #using
Utilization of a Local Grid of Mac OS X-Based Computers using Xgrid (DAK, MM), pp. 264–265.
HPDCHPDC-2004-WalkerM #coordination #using #workflow
Orchestrating and Coordinating Scientific/Engineering Workflows using GridShell (EW, TM), pp. 270–271.
HPDCHPDC-2004-WeinbergJDFH #execution #matrix #query #using
Gridflow Description, Query, and Execution at SCEC using the SDSC Matrix (JW, AJ, AD, MF, YH), pp. 262–263.
HPDCHPDC-2004-ZangrilliL #monitoring #network #using
Using Passive Traces of Application Traffic in a Network Monitoring System (MZ, BL), pp. 77–86.
HPDCHPDC-2004-ZhangKPCNWS #algorithm #parallel #using
Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms (XZ, TMK, TP, ÜVÇ, SN, PW, JHS), pp. 4–13.
LCTESLCTES-2004-ImH #multi #realtime #scalability #scheduling #using
Dynamic voltage scaling for real-time multi-task scheduling using buffers (CI, SH), pp. 88–94.
OSDIOSDI-2004-BarhamDIM #modelling #using
Using Magpie for Request Extraction and Workload Modelling (PB, AD, RI, RM), pp. 259–272.
OSDIOSDI-2004-YangTEM #exclamation #fault #file system #model checking #using
Using Model Checking to Find Serious File System Errors (Awarded Best Paper!) (JY, PT, DRE, MM), pp. 273–288.
CAVCAV-2004-ChangBD #design #interface #refinement #using #verification
Using Interface Refinement to Integrate Formal Verification into the Design Cycle (JC, SB, DLD), pp. 122–134.
CAVCAV-2004-RayH #deduction #first-order #pipes and filters #quantifier #using #verification
Deductive Verification of Pipelined Machines Using First-Order Quantification (SR, WAHJ), pp. 31–43.
FATESFATES-2004-BlomHJP #automaton #generative #specification #testing #using
Specifying and Generating Test Cases Using Observer Automata (JB, AH, BJ, PP), pp. 125–139.
FATESFATES-2004-HongU #cost analysis #generative #model checking #testing #using
Using Model Checking for Reducing the Cost of Test Generation (HSH, HU), pp. 110–124.
FATESFATES-2004-LarsenMN #online #realtime #testing #using
Online Testing of Real-time Systems Using Uppaal (KGL, MM, BN), pp. 79–94.
FATESFATES-2004-YoonKSC #analysis #component #empirical #fault #injection #mutation testing #testing #using
Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
ICLPICLP-2004-ErdemW #programming #set #using
Rectilinear Steiner Tree Construction Using Answer Set Programming (EE, MDFW), pp. 386–399.
ICLPICLP-2004-Smaus #logic programming #source code #termination #using
Termination of Logic Programs Using Various Dynamic Selection Rules (JGS), pp. 43–57.
IJCARIJCAR-2004-DenneyFS #automation #proving #theorem proving #using
Using Automated Theorem Provers to Certify Auto-generated Aerospace Software (ED, BF, JS), pp. 198–212.
IJCARIJCAR-2004-MengP #interactive #proving #using
Experiments on Supporting Interactive Proof Using Resolution (JM, LCP), pp. 372–384.
IJCARIJCAR-2004-ThiemannGS #composition #dependence #proving #termination #using
Improved Modular Termination Proofs Using Dependency Pairs (RT, JG, PSK), pp. 75–90.
LICSLICS-2004-SeshiaB #bound #quantifier #using
Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds (SAS, REB), pp. 100–109.
RTARTA-2004-Takai #abstract interpretation #term rewriting #using #verification
A Verification Technique Using Term Rewriting Systems and Abstract Interpretation (TT), pp. 119–133.
SATSAT-2004-GummadiNV #algorithm #independence #satisfiability #set #using
Algorithms for Satisfiability using Independent Sets of Variables (RG, NSN, VR), pp. 56–63.
SATSAT-2004-HuangD #performance #using
Using DPLL for Efficient OBDD Construction (JH, AD), pp. 127–136.
SATSAT-2004-ManquinhoM #bound #optimisation #pseudo #satisfiability #using
Using Lower-Bound Estimates in SAT-Based Pseudo-Boolean Optimization (VMM, JPMS), pp. 120–126.
ICTSSTestCom-2004-NeukirchenDG #communication #realtime #requirements #testing #using
Communication Patterns for Expressing Real-Time Requirements Using MSC and Their Application to Testing (HN, ZRD, JG), pp. 144–159.
ICTSSTestCom-2004-Vassiliou-GiolesDS #execution #using
Execution of External Applications using TTCN-3 (TVG, GD, IS), pp. 209–223.
VMCAIVMCAI-2004-Etessami #analysis #data flow #equation #game studies #graph #recursion #using
Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
VMCAIVMCAI-2004-HatcliffRD #concurrent #model checking #object-oriented #specification #using #verification
Verifying Atomicity Specifications for Concurrent Object-Oriented Software Using Model-Checking (JH, R, MBD), pp. 175–190.
VMCAIVMCAI-2004-PaceS #difference #kernel #model checking #using
Model Checking Polygonal Differential Inclusions Using Invariance Kernels (GJP, GS), pp. 110–121.
ASEASE-2003-AbergLSMM #aspect-oriented #automation #evolution #kernel #logic #on the #using
On the automatic evolution of an OS kernel using temporal logic and AOP (RAÅ, JLL, MS, GM, AFLM), pp. 196–204.
ASEASE-2003-ChoiH #abstraction #model checking #reduction #requirements #specification #using
Model Checking Software Requirement Specifications using Domain Reduction Abstraction (YC, MPEH), pp. 314–317.
ASEASE-2003-DiazTB #automation #metaheuristic #testing #using
Automated Software Testing Using a Metaheuristic Technique Based on Tabu Search (ED, JT, RB), pp. 310–313.
ASEASE-2003-MemonBN #effectiveness #question #testing #user interface #what
What Test Oracle Should I Use for Effective GUI Testing? (AMM, IB, AN), pp. 164–173.
ASEASE-2003-Moore #communication #requirements #user interface #using
Communicating Requirements Using End-User GUI Constructions with Argumentation (JMM), pp. 360–363.
ASEASE-2003-ShlyakhterSJST #debugging #declarative #modelling #satisfiability #using
Debugging Overconstrained Declarative Models Using Unsatisfiable Cores (IS, RS, DJ, MS, MT), pp. 94–105.
DACDAC-2003-AlpertLKD #metric #using
Delay and slew metrics using the lognormal distribution (CJA, FL, CVK, AD), pp. 382–385.
DACDAC-2003-ClarkeKY #behaviour #bound #c #consistency #model checking #source code #using
Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
DACDAC-2003-CroixW #analysis #modelling #using
Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
DACDAC-2003-DescampsBGIP #design #network #using
Design of a 17-million gate network processor using a design factory (GED, SB, SG, SI, AP), pp. 844–849.
DACDAC-2003-FineZ #functional #generative #network #testing #using #verification
Coverage directed test generation for functional verification using bayesian networks (SF, AZ), pp. 286–291.
DACDAC-2003-GadN #congruence #order #reduction #using
Model order reduction of nonuniform transmission lines using integrated congruence transform (EG, MSN), pp. 238–243.
DACDAC-2003-HenftlingZBZE #architecture
Re-use-centric architecture for a fully accelerated testbench environment (RH, AZ, MB, MZ, WE), pp. 372–375.
DACDAC-2003-HuangC #embedded #framework #using #verification
Using embedded infrastructure IP for SOC post-silicon verification (YH, WTC), pp. 674–677.
DACDAC-2003-LauP #algorithm #design #using
Fractional-N frequency synthesizer design at the transfer function level using a direct closed loop realization algorithm (CYL, MHP), pp. 526–531.
DACDAC-2003-LeeCHY #multi #scalability #using
Multilevel floorplanning/placement for large-scale modules using B*-trees (HCL, YWC, JMH, HHY), pp. 812–817.
DACDAC-2003-LiYRP #generative #markov #using
A scan BIST generation method using a markov source and partial bit-fixing (WL, CY, SMR, IP), pp. 554–559.
DACDAC-2003-MishchenkoS #composition #functional #scalability #using
Large-scale SOP minimization using decomposition and functional properties (AM, TS), pp. 149–154.
DACDAC-2003-NohlGBALSM #architecture #encoding #modelling #synthesis #using
Instruction encoding synthesis for architecture exploration using hierarchical processor models (AN, VG, GB, AH, RL, OS, HM), pp. 262–267.
DACDAC-2003-OMahonyYHW #design #network #using
Design of a 10GHz clock distribution network using coupled standing-wave oscillators (FO, CPY, MH, SSW), pp. 682–687.
DACDAC-2003-QinC #reduction #using
Realizable parasitic reduction using generalized Y-Delta transformation (ZQ, CKC), pp. 220–225.
DACDAC-2003-SehgalIKC #multi #reduction #using
Test cost reduction for SOCs using virtual TAMs and lagrange multipliers (AS, VI, MDK, KC), pp. 738–743.
DACDAC-2003-SoDH #behaviour #design #synthesis #tool support #using
Using estimates from behavioral synthesis tools in compiler-directed design space exploration (BS, PCD, MWH), pp. 514–519.
DACDAC-2003-Tahoori #satisfiability #testing #using
Using satisfiability in application-dependent testing of FPGA interconnects (MBT), pp. 678–681.
DACDAC-2003-TasiranYB #model checking #monitoring #simulation #specification #using
Using a formal specification and a model checker to monitor and direct simulation (ST, YY, BB), pp. 356–361.
DACDAC-2003-VasudevanR #using
Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique (VV, MR), pp. 538–541.
DACDAC-2003-WangM #multi #network #optimisation #power management #using
On-chip power supply network optimization using multigrid-based technique (KW, MMS), pp. 113–118.
DACDAC-2003-ZhuYC #adaptation #algebra #analysis #approach #multi #network #using
Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
DATEDATE-2003-AgarwalBZV #analysis #bound #statistics #using
Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATEDATE-2003-Al-ArsGBR #fault #optimisation #simulation #testing #using
Optimizing Stresses for Testing DRAM Cell Defects Using Electrical Simulation (ZAA, AJvdG, JB, DR), pp. 10484–10489.
DATEDATE-2003-CaldariCCCPT #architecture #modelling #transaction #using
Transaction-Level Models for AMBA Bus Architecture Using SystemC 2.0 (MC, MC, MC, SC, LP, CT), pp. 20026–20031.
DATEDATE-2003-CarbognaniLICB #modelling #precise #standard #using #verification
Qualifying Precision of Abstract SystemC Models Using the SystemC Verification Standard (FC, CKL, CNI, AC, PB), pp. 20088–20094.
DATEDATE-2003-Castro-LopezFMR #behaviour #hardware #modelling #simulation #using
Behavioural Modelling and Simulation of SigmaDelta Modulators Using Hardware Description Languages (RCL, FVF, FM, ÁRV), pp. 10168–10175.
DATEDATE-2003-ChoiB #migration #network #using
Hierarchical Global Floorplacement Using Simulated Annealing and Network Flow Area Migration (WC, KB), pp. 11104–11105.
DATEDATE-2003-DebOJ #analysis #embedded #simulation #using
Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, , AJ), pp. 11100–11101.
DATEDATE-2003-DoboliGD #clustering #modelling #network #using
Extraction of Piecewise-Linear Analog Circuit Models from Trained Neural Networks Using Hidden Neuron Clustering (SD, GG, AD), pp. 11098–11099.
DATEDATE-2003-IskanderDAMHSM #synthesis #using
Synthesis of CMOS Analog Cells Using AMIGO (RI, MD, MA, MM, NH, NS, SM), pp. 20297–20302.
DATEDATE-2003-IyengarCSC #approach #optimisation #testing #using
A Unified Approach for SOC Testing Using Test Data Compression and TAM Optimization (VI, AC, SS, KC), pp. 11188–11190.
DATEDATE-2003-MeiVVML #architecture #configuration management #parallel #scheduling #using
Exploiting Loop-Level Parallelism on Coarse-Grained Reconfigurable Architectures Using Modulo Scheduling (BM, SV, DV, HDM, RL), pp. 10296–10301.
DATEDATE-2003-MoussaGN #modelling #performance #transaction #using
Exploring SW Performance Using SoC Transaction-Level Modeling (IM, TG, GN), pp. 20120–20125.
DATEDATE-2003-OhKWS #architecture #feedback #using
Test Pattern Compression Using Prelude Vectors in Fan-Out Scan Chain with Feedback Architecture (NO, RK, TWW, JS), pp. 10110–10115.
DATEDATE-2003-OhtakeOF #algorithm #fault #generative #testing #using
A Method of Test Generation fo Path Delay Faults Using Stuck-at Fault Test Generation Algorithms (SO, KO, HF), pp. 10310–10315.
DATEDATE-2003-OikonomakosZA #metric #online #self #synthesis #testing #using
Versatile High-Level Synthesis of Self-Checking Datapaths Using an On-Line Testability Metric (PO, MZ, BMAH), pp. 10596–10601.
DATEDATE-2003-RoychoudhuryMK #debugging #protocol #using
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
DATEDATE-2003-SayintaCPAD #abstraction #case study #using #verification
A Mixed Abstraction Level Co-Simulation Case Study Using SystemC for System on Chip Verification (AS, GC, MP, AA, WD), pp. 20095–20100.
DATEDATE-2003-SeidlEJ #using
Performance-Directed Retiming for FPGAs Using Post-Placement Delay Information (US, KE, FMJ), pp. 10770–10777.
DATEDATE-2003-ShengH #novel #performance #using
Efficient Preimage Computation Using A Novel Success-Driven ATPG (SS, MSH), pp. 10822–10827.
DATEDATE-2003-WangM #multi #optimisation #using
Power/Ground Mesh Area Optimization Using Multigrid-Based Technique (KW, MMS), pp. 10850–10855.
DATEDATE-2003-WedlerSK #encoding #induction #using
Using RTL Statespace Information and State Encoding for Induction Based Property Checking (MW, DS, WK), pp. 11156–11157.
DATEDATE-2003-ZengZHC #correlation #performance #using
Fast Computation of Data Correlation Using BDDs (ZZ, QZ, IGH, MJC), pp. 10122–10129.
DATEDATE-2003-ZhangM #implementation #independence #satisfiability #using #validation
Validating SAT Solvers Using an Independent Resolution-Based Checker: Practical Implementations and Other Applications (LZ, SM), pp. 10880–10885.
DocEngDocEng-2003-Bulterman #interactive #multi #using
Using SMIL to encode interactive, peer-level multimedia annotations (DCAB), pp. 32–41.
DocEngDocEng-2003-MongB #using #visual notation #web
Using SVG as the rendering model for structured and graphically complex web material (JCM, DFB), pp. 88–91.
DRRDRR-2003-MaderlechnerS #recognition #set #using
Extraction of valid data sets in registers using recognition of invalidation lines (GM, PS), pp. 67–72.
DRRDRR-2003-SuwaN #algorithm #composition #image #using
Separation algorithm of superimposed pattern using directional decomposition of an image (MS, SN), pp. 278–285.
HTHT-2003-DelortBR #documentation #summary #using #web
Enhanced web document summarization using hyperlinks (JYD, BBM, MR), pp. 208–215.
HTHT-2003-FallensteinLHA #named #using #web
Storm: using P2P to make the desktop part of the web (BF, TJL, HH, TA), pp. 150–151.
HTHT-2003-SugiyamaHYU #refinement #using #web
Refinement of TF-IDF schemes for web pages using their hyperlinked neighboring pages (KS, KH, MY, SU), pp. 198–207.
ICDARICDAR-2003-AlamKNRTW #design #documentation #summary #using
Structured and Unstructured Document Summarization: Design of a Commercial Summarizer using Lexical Chains (HA, AK, MN, AFRR, YT, CW), pp. 1147–1152.
ICDARICDAR-2003-AllierE #prototype #using
Font Type Extraction and Character Prototyping Using Gabor Filters (BA, HE), pp. 799–803.
ICDARICDAR-2003-BaldiMS #classification #set #using
Using tree-grammars for training set expansion in page classification (SB, SM, GS), pp. 829–833.
ICDARICDAR-2003-BrittoSSSB #algorithm #clustering #low cost #parallel #using
A Low-Cost Parallel K-Means VQ Algorithm Using Cluster Computing (AdSBJ, PSLdS, RS, SdRSdS, DLB), pp. 839–843.
ICDARICDAR-2003-BulacuSV #identification #using
Writer Identification Using Edge-Based Directional Features (MB, LS, LV), pp. 937–941.
ICDARICDAR-2003-ChangC #algorithm #component #using
A Component-Labeling Algorithm Using Contour Tracing Technique (FC, CJC), pp. 741–745.
ICDARICDAR-2003-ChaTS #algorithm #optimisation #recognition #search-based #similarity #using
Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition (SHC, CCT, SNS), pp. 662–665.
ICDARICDAR-2003-DelalandreNTO #recognition #representation #xml
Symbols Recognition by Global-Local Structural Approaches, Based on the Scenarios Use, and with a XML Representation of Data (MD, SN, ÉT, JMO), pp. 1002–1006.
ICDARICDAR-2003-El-NasanVN #n-gram #recognition #using
Handwriting Recognition Using Position Sensitive Letter N-Gram Matching (AEN, SV, GN), p. 577–?.
ICDARICDAR-2003-GuestCFP #analysis #automation #classification #geometry #sequence #using
Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
ICDARICDAR-2003-HuoF #modelling #performance #using
Improving Chinese/English OCR Performance by Using MCE-based Character-Pair Modeling and Negative Training (QH, ZDF), pp. 364–368.
ICDARICDAR-2003-LauYT #image #sequence #using
Recovery of Writing Sequence of Static Images of Handwriting using UWM (KKL, PCY, YYT), pp. 1123–1127.
ICDARICDAR-2003-LeedhamC #identification #using
Writer Identification using Innovative Binarised Features of Handwritten Numerals (GL, SC), pp. 413–417.
ICDARICDAR-2003-LiWZ #approach #image #statistics #string #using
String Extraction From Color Airline Coupon Image Using Statistical Approach (YL, ZW, HZ), pp. 289–293.
ICDARICDAR-2003-LooT #image #segmentation #using
Using Irregular Pyramid for Text Segmentation and Binarization of Gray Scale Image (PKL, CLT), pp. 594–598.
ICDARICDAR-2003-LuoL #approach #recognition #using
Engineering Drawings Recognition Using a Case-based Approach (YL, LW), pp. 190–194.
ICDARICDAR-2003-Mori #feature model #recognition #using #video
Video text recognition using feature compensation as category-dependent feature extraction (MM), pp. 645–649.
ICDARICDAR-2003-MoritaSBS03a #algorithm #feature model #multi #recognition #search-based #using #word
Unsupervised Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Word Recognition (MEM, RS, FB, CYS), pp. 666–670.
ICDARICDAR-2003-MuramatsuKSA #evaluation #flexibility #recognition #standard #using
Improvement of Matching and Evaluation in Handwritten Numeral Recognition Using Flexible Standard Patterns (HM, TK, TS, KA), pp. 273–277.
ICDARICDAR-2003-NishimuraT #online #recognition #using
Off-line Character Recognition using On-line Character Writing Information (HN, TT), pp. 168–172.
ICDARICDAR-2003-PechwitzM #approach #database #recognition #using #word
HMM Based Approach for Handwritten Arabic Word Recognition Using the IFN/ENIT- Database (MP, VM), pp. 890–894.
ICDARICDAR-2003-RadtkeOSW #algorithm #design #multi #using
Intelligent Zoning Design Using Multi-Objective Evolutionary Algorithms (PVWR, LESdO, RS, TW), pp. 824–828.
ICDARICDAR-2003-SchenkerLBK #classification #documentation #graph #using #web
Classification of Web Documents Using a Graph Model (AS, ML, HB, AK), pp. 240–244.
ICDARICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #using #verification
A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
ICDARICDAR-2003-ShiG #detection #documentation #fuzzy #image #using
Skew Detection for Complex Document Images Using Fuzzy Runlength (ZS, VG), pp. 715–719.
ICDARICDAR-2003-SimardSBCC #recognition #segmentation #using
Using Character Recognition and Segmentation to Tell Computer from Humans (PYS, RS, JB, JC, IC), pp. 418–423.
ICDARICDAR-2003-SouzaCNS #assessment #automation #image #quality #using
Automatic Filter Selection Using Image Quality Assessment (AS, MC, SN, CYS), p. 508–?.
ICDARICDAR-2003-SutantoLP #analysis #consistency #documentation
Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter “a” (PJS, GL, VP), pp. 1091–1095.
ICDARICDAR-2003-TomaiS #using
Combination of Type III Digit Recognizers using the Dempster-Shafer Theory of Evidence (CIT, SNS), pp. 854–858.
ICDARICDAR-2003-UchidaS #recognition #using
Handwritten character recognition using elastic matching based on a class-dependent deformation model (SU, HS), pp. 163–167.
ICDARICDAR-2003-Ueda #pattern matching #using #verification
Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
ICDARICDAR-2003-Wakahara #correlation #recognition #using
Shape Matching Using GAT Correlation against Nonlinear Distortion and its Application to Handwritten Numeral Recognition (TW), p. 54–?.
ICDARICDAR-2003-WangDL #identification #linear #using
Writer Identification Using Directional Element Features and Linear Transform (XW, XD, HL), pp. 942–945.
ICDARICDAR-2003-WendlingT #geometry #recognition #using
Recognition of Arrows in Line Drawings based on the Aggregation of Geometric Criteria using the Choquet Integral (LW, ST), pp. 299–303.
ICDARICDAR-2003-WuA #approach #automation #multi #using
Automatic Thresholding of Gray-level Using Multi-stage Approach (SW, AA), pp. 493–497.
ICDARICDAR-2003-YamazakiNK #markov #modelling #using #verification
Text-indicated Writer Verification Using Hidden Markov Models (YY, TN, NK), pp. 329–332.
ICDARICDAR-2003-YangVN #recognition #scalability #set #using
Accelerating Large Character Set Recognition using Pivots (YY, OV, MN), pp. 262–267.
ICDARICDAR-2003-YouK #approach #network #segmentation #string #using
An approach for locating segmentation points of handwritten digit strings using a neural network (DY, GK), p. 142–?.
ICDARICDAR-2003-ZhangS #analysis #using #word
Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
ICDARICDAR-2003-ZhengLD03a #documentation #identification #image #markov #random #using
Text Identification in Noisy Document Images Using Markov Random Field (YZ, HL, DSD), p. 599–?.
ICDARICDAR-2003-ZouTLL #analysis #online #using #verification
On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
PODSPODS-2003-GarofalakisK #correlation #data type #distance #edit distance #using #xml
Correlating XML data streams using tree-edit distance embeddings (MNG, AK), pp. 143–154.
PODSPODS-2003-GrahneT #constraints #query #using
Query containment and rewriting using views for regular path queries under constraints (GG, AT), pp. 111–122.
PODSPODS-2003-HeerenJP #using
Optimal indexing using near-minimal space (CH, HVJ, LP), pp. 244–251.
SIGMODSIGMOD-2003-DeHaanTCO #encoding #sql #using #xquery
A Comprehensive XQuery to SQL Translation using Dynamic Interval Encoding (DD, DT, MPC, MTÖ), pp. 623–634.
SIGMODSIGMOD-2003-GotoK #integration #mobile #using
Integration of Electronic Tickets and Personal Guide System for Public Transport using Mobile Terminals (KG, YK), pp. 642–646.
SIGMODSIGMOD-2003-KimC #adaptation #clustering #feedback #image #named #retrieval #using
Qcluster: Relevance Feedback Using Adaptive Clustering for Content-Based Image Retrieval (DHK, CWC), pp. 599–610.
SIGMODSIGMOD-2003-KriegelBKPS #set #similarity #using
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects (HPK, SB, PK, MP, MS), pp. 587–598.
SIGMODSIGMOD-2003-ZhangDWEMPMDR #multi #named #optimisation #using #xml
Rainbow: Multi-XQuery Optimization Using Materialized XML Views (XZ, KD, LW, MES, BM, BP, MM, LD, EAR), p. 671.
SIGMODSIGMOD-2003-ZuzartePMCLW #using
WinMagic : Subquery Elimination Using Window Aggregation (CZ, HP, WM, QC, LL, KW), pp. 652–656.
VLDBVLDB-2003-HardingLM #named #using #xml
XISS/R: XML Indexing and Storage System using RDBMS (PJH, QL, BM), pp. 1073–1076.
VLDBVLDB-2003-MiklauS #encryption #using
Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
VLDBVLDB-2003-NieKH #effectiveness #integration #mining #named #statistics #using
BibFinder/StatMiner: Effectively Mining and Using Coverage and Overlap Statistics in Data Integration (ZN, SK, TH), pp. 1097–1100.
VLDBVLDB-2003-Schoning #database
Commercial Use of Database Technology (HS), p. 1034.
VLDBVLDB-2003-WitkowskiBBFGSS #modelling #spreadsheet #sql #using
Business Modelling Using SQL Spreadsheets (AW, SB, TB, NF, AG, LS, SS), pp. 1117–1120.
ITiCSEITiCSE-2003-BarrosEDPS #programming #using
Using lab exams to ensure programming practice in an introductory programming course (JPB, LE, RD, RP, ES), pp. 16–20.
ITiCSEITiCSE-2003-Becker03a #programming #using
Grading programming assignments using rubrics (KB), p. 253.
ITiCSEITiCSE-2003-Cassel #using
Using CITIDEL resources to support documenting objectives and outcomes (LNC), p. 255.
ITiCSEITiCSE-2003-CasselIKGFLP #education #library #using
Using an education oriented digital library to organize and present classes in computing and information (LNC, JI, DK, CLG, EAF, JL, MAPQ), p. 260.
ITiCSEITiCSE-2003-DemetriadisTP #learning #multi #student #towards
A phenomenographic study of students’ attitudes toward the use of multiple media for learning (SND, ET, ASP), pp. 183–187.
ITiCSEITiCSE-2003-Fone #education #performance #using
Using semiotics to analyze the efficiency of a model in teaching (WF), p. 232.
ITiCSEITiCSE-2003-HollowayR #development #programming #student #using
Development of a MLE by students for students using extreme programming techniques (JH, MR), p. 225.
ITiCSEITiCSE-2003-HuangS #design #education #using
Teaching undergraduate software design in a liberal arts environment using RoboCup (TH, FS), pp. 114–118.
ITiCSEITiCSE-2003-JulianoCK #architecture #education #using
Observations from using two modes of teaching undergraduate computer architecture (BAJ, CHC, EK), p. 248.
ITiCSEITiCSE-2003-KnoxCI #education #using
Using the NSDL and CITIDEL to enhance teaching (DK, LNC, JI), p. 246.
ITiCSEITiCSE-2003-KolasF #game studies #motivation #using
Increasing assignment motivation using a game Al tournament (ØK, IF), p. 269.
ITiCSEITiCSE-2003-KoldehofePT #case study #distributed #using #visualisation
Integrating a simulation-visualisation environment in a basic distributed systems course: a case study using LYDIAN (BK, MP, PT), pp. 35–39.
ITiCSEITiCSE-2003-LassCBCPHZ #off the shelf #scalability #tool support #using
Tools and techniques for large scale grading using Web-based commercial off-the-shelf software (RNL, CDC, NTB, BWC, JLP, NH, PZ), pp. 168–172.
ITiCSEITiCSE-2003-Leska #java #learning #user interface #using
Learning to develop GUIs in Java using closed labs (CL), p. 228.
ITiCSEITiCSE-2003-MeedenNBK #difference #gender #using
Using departmental surveys to assess computing culture: quantifying gender differences in the classroom (LM, TN, DSB, DK), pp. 188–192.
ITiCSEITiCSE-2003-NevisonW #case study #design pattern #education #java #using
Teaching objects early and design patterns in Java using case studies (CN, BW), pp. 94–98.
ITiCSEITiCSE-2003-PapadopoulosP #algorithm #authoring #education #using
Using ToolBook authoring tool to facilitate the teaching of algorithms (GP, HMP), p. 277.
ITiCSEITiCSE-2003-PatersonH #database #education #ide #java #object-oriented #using
Teaching Java: using an object-oriented database and the BlueJ IDE (JHP, JH), p. 273.
ITiCSEITiCSE-2003-SchwarmV #assessment #concept #elicitation #information management #student #using
Making connections: using classroom assessment to elicit students’ prior knowledge and construction of concepts (SES, TV), pp. 65–69.
ITiCSEITiCSE-2003-Sojka03a #agile #evaluation #multi #testing #tex #using
Rapid evaluation using multiple choice tests and TeX (PS), p. 265.
ITiCSEITiCSE-2003-Sojka03b #education #interactive #javascript #using
Interactive teaching materials in PDF using JavaScript (PS), p. 275.
ESOPESOP-2003-AltisenCMR #using
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
ESOPESOP-2003-Flanagan #automation #model checking #using
Automatic Software Model Checking Using CLP (CF), pp. 189–203.
FASEFASE-2003-HeckelL #development #modelling #using #visual notation #web
Model-Based Development of Web Applications Using Graphical Reaction Rules (RH, ML), pp. 170–183.
FASEFASE-2003-Kruger #using
Capturing Overlapping, Triggered, and Preemptive Collaborations Using MSCs (IK), pp. 387–402.
FoSSaCSFoSSaCS-2003-Laird #continuation #game studies #semantics
A Game Semantics of Linearly Used Continuations (JL), pp. 313–327.
TACASTACAS-2003-FersmanMPY #analysis #scheduling #using
Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
TACASTACAS-2003-Schmidt #invariant #petri net #using
Using Petri Net Invariants in State Space Construction (KS0), pp. 473–488.
TACASTACAS-2003-UchitelCKM #behaviour #named #tool support #using
LTSA-MSC: Tool Support for Behaviour Model Elaboration Using Implied Scenarios (SU, RC, JK, JM), pp. 597–601.
CSMRCSMR-2003-CasanovaSJ #component #development #evolution #library #using
Supporting Evolution in Component-Based Development Using Component Libraries (MC, RVDS, VJ), pp. 123–132.
CSMRCSMR-2003-ClarkeMG #identification #object-oriented #taxonomy #using
Using a Taxonomy Tool to Identify Changes in OO Softwar (PJC, BAM, JPG), pp. 213–222.
CSMRCSMR-2003-JinCD #adaptation #concept #integration #reverse engineering #tool support #transaction #using
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter (DJ, JRC, TRD), pp. 399–408.
CSMRCSMR-2003-Latendresse #c #c++ #evaluation #performance #preprocessor #symbolic computation #using
Fast Symbolic Evaluation of C/C++ Preprocessing Using Conditional Value (ML), p. 170–?.
CSMRCSMR-2003-MoeCP #distributed #refinement #using
Using Observation and Refinement to Improve Distributed Systems Test (JM, DAC, MP), pp. 153–159.
CSMRCSMR-2003-RaoS #empirical #maintenance #outsourcing #using
Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
CSMRCSMR-2003-SaeedMBHS #algorithm #clustering
Software Clustering Techniques and the Use of Combined Algorithm (MS, OM, HAB, SZH, SMS), pp. 301–306.
CSMRCSMR-2003-SciascioDMP #design #maintenance #model checking #using #web
Web Applications Design and Maintenance Using Symbolic Model Checking (EDS, FMD, MM, GP), pp. 63–72.
CSMRCSMR-2003-TourweM #identification #logic #metaprogramming #refactoring #using
Identifying Refactoring Opportunities Using Logic Meta Programming (TT, TM), pp. 91–100.
ICSMEICSM-2003-AntoniolP #information management #library #using
Library Miniaturization Using Static and Dynamic Information (GA, MDP), p. 235–?.
ICSMEICSM-2003-BaldassarreCV #estimation #using
Software Renewal Projects Estimation Using Dynamic Calibration (MTB, DC, GV), pp. 105–115.
ICSMEICSM-2003-JohnsonD #experience #information management #legacy #reverse engineering #using
Experience in developing interoperations among legacy information systems using partial reverse engineering (MJ, CNGD), pp. 369–372.
ICSMEICSM-2003-LovrekJKLCHDL #maintenance #using
Improving Software Maintenance by using Agent-based Remote Maintenance Shell (IL, GJ, MK, IL, AC, DH, SD, OL), pp. 440–449.
ICSMEICSM-2003-MensPG #maintenance #source code #using
Using Intentional Source-Code Views to Aid Software Maintenance (KM, BP, SG), pp. 169–178.
ICSMEICSM-2003-Mul #internet #legacy
Making maximum use of legacy code: Transavia internet booking engine (CM), p. 466.
ICSMEICSM-2003-QuahT #metric #network #object-oriented #predict #quality #using
Application of Neural Networks for Software Quality Prediction Using Object-Oriented Metrics (TSQ, MMTT), p. 116–?.
ICSMEICSM-2003-Terekhov #architecture #legacy
Re-using software architecture in legacy transformation projects (AAT), p. 462.
IWPCIWPC-2003-AntoniolPM #abstract syntax tree #ocl #using
YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs (GA, MDP, EM), pp. 13–22.
IWPCIWPC-2003-ChiricotaJM #clustering #component #graph #using
Software Components Capture Using Graph Clustering (YC, FJ, GM), pp. 217–226.
IWPCIWPC-2003-Cordy #agile #semiparsing #source code #using #xml
Generalized Selective XML Markup of Source Code Using Agile Parsing (JRC), pp. 144–153.
IWPCIWPC-2003-CoxC #analysis #approximate #semiparsing #using
Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
IWPCIWPC-2003-GschwindOP #comprehension #runtime #using
Using Run-Time Data for Program Comprehension (TG, JO, MP), pp. 245–250.
IWPCIWPC-2003-MarcusFM #3d #analysis #comprehension #using #visualisation
Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
IWPCIWPC-2003-RiccaT #clustering #migration #using #web
Using Clustering to Support the Migration from Static to Dynamic Web Pages (FR, PT), pp. 207–216.
IWPCIWPC-2003-RillingK #complexity #comprehension #identification #metric #slicing #using
Identifying Comprehension Bottlenecks Using Program Slicing and Cognitive Complexity Metric (JR, TK), pp. 115–124.
SCAMSCAM-2003-GuoCD #java #using
Unique Renaming of Java Using Source Transformation (XG, JRC, TRD), pp. 151–160.
SCAMSCAM-2003-Leitao #2d #detection #using
Detection of Redundant Code using R2D2 (AML), pp. 183–192.
SCAMSCAM-2003-Verhoef #analysis #multi #source code #using
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
WCREWCRE-2003-BodhuinGT #migration #using #web
Migration of non-decomposable software systems to the Web using screen proxies (TB, EG, MT), pp. 165–174.
WCREWCRE-2003-DahnM #c #program transformation #source code #using
Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
WCREWCRE-2003-ZouG #analysis #detection #using
Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
PLDIPLDI-2003-BerndlLQHU #analysis #points-to #using
Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
SASSAS-2003-HermenegildoPBL #abstract interpretation #development #preprocessor #using
Program Development Using Abstract Interpretation (And The Ciao System Preprocessor) (MVH, GP, FB, PLG), pp. 127–152.
SASSAS-2003-KremenekE #approximate #named #static analysis #statistics #using
Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations (TK, DRE), pp. 295–315.
CIAACIAA-2003-FerroDFL #programming #robust #semiparsing #using
Robust Parsing Using Dynamic Programming (MVF, VMD, JVF, LRL), pp. 258–268.
CIAACIAA-2003-Fritz #automaton #linear #logic #simulation #using
Constructing Büchi Automata from Linear Temporal Logic Using Simulation Relations for Alternating Büchi Automata (CF), pp. 35–48.
CIAACIAA-2003-XieLD #complexity #equation #linear #problem #using
New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (GX, CL, ZD), pp. 163–175.
FMFME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-Henderson #correctness #proving #using
Proving the Correctness of Simpson’s 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method (NH), pp. 244–263.
FMFME-2003-Lettrari #abstraction #heuristic #object-oriented #using
Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems (ML), pp. 462–481.
FMFME-2003-StidolphW #formal method
Managerial Issues for the Consideration and Use of Formal Methods (DCS, EJWJ), pp. 170–186.
SEFMSEFM-2003-BeckertS #using #verification
Program Verification Using Change Information (BB, PHS), p. 91–?.
SEFMSEFM-2003-GawanmehTW #design #using #verification
Formal Verification of ASM Designs Using the MDG Tool (AG, ST, KW), pp. 210–219.
SEFMSEFM-2003-McCombS #animation #specification #using
Animation of Object-Z Specifications Using a Z Animator (TM, GS), p. 191–?.
SEFMSEFM-2003-Sangiorgi #mobile #process #using
Taming Mobile Processes Using Types (DS), p. 64–?.
IFLIFL-2003-Choppella #equation #polymorphism #re-engineering #using
Polymorphic Type Reconstruction Using Type Equations (VC), pp. 53–68.
AGTIVEAGTIVE-2003-DottiRS #analysis #behaviour #fault #graph grammar #specification #using
Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
AGTIVEAGTIVE-2003-Rotschke #graph transformation #re-engineering #using
Re-engineering a Medical Imaging System Using Graph Transformations (TR), pp. 185–201.
CHICHI-2003-ChiRSWRCRDCC #automation #usability #using #web
The bloodhound project: automating discovery of web usability issues using the InfoScent simulator (EHhC, AR, GS, AW, CR, CC, ER, BD, JC, SBC), pp. 505–512.
CHICHI-2003-ForlizziLH #using
The kinedit system: affective messages using dynamic texts (JF, JCL, SEH), pp. 377–384.
CHICHI-2003-FurnasQ #interactive #using
Using pixel rewrites for shape-rich interaction (GWF, YQ), pp. 369–376.
CHICHI-2003-GrossmanBS #interface #using
An interface for creating and manipulating curves using a high degree-of-freedom curve input device (TG, RB, KS), pp. 185–192.
CHICHI-2003-KitamuraYHKK #tool support
Things happening in the brain while humans learn to use new tools (YK, YY, HI, FK, MK), pp. 417–424.
CHICHI-2003-VertegaalWSC #named #using #video
GAZE-2: conveying eye contact in group video conferencing using eye-controlled camera direction (RV, IW, CS, CC), pp. 521–528.
CHICHI-2003-YamauchiWB
Information use of service technicians in difficult cases (YY, JW, DGB), pp. 81–88.
VISSOFTVISSOFT-2003-WheeldonCK #comprehension #named #using
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 48–52.
VISSOFTVISSOFT-2003-WheeldonCK1 #comprehension #named #using
AutoCode: Using Memex-like Trails to Improve Program Comprehension (RW, SC, KK), pp. 56–57.
AdaEuropeAdaEurope-2003-AlvesJH #ada #xml
The Use of Ada, GNAT.Spitbol, and XML in the Sol-Eu-Net Project (MAA, AJ, MH), pp. 196–207.
AdaEuropeAdaEurope-2003-BliebergerB #evaluation #symbolic computation #using
Eliminating Redundant Range Checks in GNAT Using Symbolic Evaluation (JB, BB), pp. 153–167.
AdaEuropeAdaEurope-2003-JeppuKS #ada #realtime #safety #testing #using
Testing Safety Critical Ada Code Using Non Real Time Testing (YVJ, KK, PSS), pp. 382–392.
AdaEuropeAdaEurope-2003-Mikkonen #case study #experience #specification #tool support #using
Experiences on Developing and Using a Tool Support for Formal Specification (TM), pp. 297–308.
AdaEuropeAdaEurope-2003-MinguetGFL #metric #using
Getting System Metrics Using POSIX Tracing Services (AEM, VLG, AGF, ACiL), pp. 220–231.
AdaEuropeAdaEurope-2003-OrtizAPS #architecture #case study #evaluation #performance #realtime #uml #using
A Case Study in Performance Evaluation of Real-Time Teleoperation Software Architectures Using UML-MAST (FJO, , JAP, PS), pp. 417–428.
CAiSECAiSE-2003-DammHG #ontology #using
Translating and Searching Service Descriptions Using Ontologies (DD, FH, AG), pp. 308–323.
EDOCEDOC-2003-DebusmannSSK #monitoring #using
Unified Service Level Monitoring using CIM (MD, MS, MS, RK), pp. 76–85.
EDOCEDOC-2003-TrastourPC #integration #semantics #using #web
Using Semantic Web Technology to Enhance Current Business-to-Business Integration Approaches (DT, CP, DC), pp. 222–231.
ICEISICEIS-v1-2003-FatoohiG #distributed #execution #using #web
A Distributed Job Execution Environment Using Asynchronous Messaging and Web Technologies (RF, NG), pp. 246–251.
ICEISICEIS-v1-2003-LeongL #approach #component #development #generative #named #using
REPCOM: A Customisable Report Generator Component System Using XML-Driven, Component-Based Development Approach (CHL, SPL), pp. 499–504.
ICEISICEIS-v1-2003-MedcraftSB #integration #named #using
DIA: Data Integration Using Agents (PSM, US, CdSB), pp. 79–86.
ICEISICEIS-v1-2003-MorleyH #enterprise #quality #resource management
Technical Use Quality in a University Enterprise Resource Planning System: Perceptions of Response Time and Its Strategic Importance (MM, LvH), pp. 341–346.
ICEISICEIS-v1-2003-Seriai #named #object-oriented #query #using
QUEROM: An Object-Oriented Model to Rewriting Query Using Views (AS), pp. 389–395.
ICEISICEIS-v1-2003-SilvaSL #using
Updating GIS Data Using Personal Digital Assistants (HS, AVS, JCL), pp. 566–569.
ICEISICEIS-v1-2003-ZarourBS #using
Using Information Technologies for Managing Cooperative Information Agent-Based Systems (NZ, MB, LS), pp. 430–440.
ICEISICEIS-v2-2003-Abdel-WahaabBHH #3d #invariant #network #recognition #using
Three-Dimensional Object Recognition Using Support Vector Machine Neural Network Based on Moment Invariant Features (MSAW, SFB, ASH, DMH), pp. 583–588.
ICEISICEIS-v2-2003-BaesensMBVS #using
Building Intelligent Credit Scoring Systems Using Decision Tables (BB, CM, MDB, JV, RS), pp. 19–25.
ICEISICEIS-v2-2003-CamposGM #abduction #network #probability #using
Partial Abductive Inference in Bayesian Networks By Using Probability Trees (LMdC, JAG, SM), pp. 83–91.
ICEISICEIS-v2-2003-ChadesSC #markov #multi #process #using
Planning Cooperative Homogeneous Multiagent Systems Using Markov Decision Processes (IC, BS, FC), pp. 426–429.
ICEISICEIS-v2-2003-Drori #documentation #identification #information management #research #using
Using Knowledge Engineering Tool to Identify the Subject of a Document — Research Results (OD), pp. 442–445.
ICEISICEIS-v2-2003-HattoriKY03a #fourier #using
Extraction of Feeling Information From Characters Using a Modified Fourier Transform (TH, HK, TY), pp. 461–464.
ICEISICEIS-v2-2003-HogoLS #clustering #network #using
Conventional Versus Interval Clustering Using Kohonen Networks (MH, PL, MS), pp. 250–257.
ICEISICEIS-v2-2003-KeeniGS #learning #network #on the #performance #using
On Fast Learning of Neural Networks Using Back Propagation (KK, KG, HS), pp. 266–271.
ICEISICEIS-v2-2003-KuusikL #approach #data mining #mining #using
An Approach of Data Mining Using Monotone Systems (RK, GL), pp. 482–485.
ICEISICEIS-v2-2003-MendesA #using
Using the I. S. as a (Dis)Organization Gauge (PM, PA), pp. 171–176.
ICEISICEIS-v2-2003-NetoCMG #analysis #network #simulation #using
Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
ICEISICEIS-v2-2003-OrtegaDA #design #evolution #using
Using Grammatical Evolution to Design Curves with a Given Fractal Dimension (AO, ALAD, MA), pp. 395–398.
ICEISICEIS-v2-2003-OuazzaneZME #database #monitoring #network #performance #process
The Use of Neural Network and Database Technology to Reengineer the Technical Process of Monitoring Coal Combustion Efficiency (KO, KZ, FM, KE), pp. 495–498.
ICEISICEIS-v2-2003-ReBB #behaviour #identification
The Use of Neurofuzzy Computable System to Identify Prominent Behavior Characteristics in Successful Entrepreneurs (AR, RB, LB), pp. 522–528.
ICEISICEIS-v2-2003-SalemSA #algorithm #self #using
Improving Self-Organizing Feature Map (SOFM) Training Algorithm Using K-Means Initialization (ABMS, MMS, AFA), pp. 399–405.
ICEISICEIS-v2-2003-SilvaIE #analysis #database #identification #information management #using
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v2-2003-TchikouG #process #using
Production Activity Control Using Autonomous Agents (MT, EG), pp. 365–371.
ICEISICEIS-v2-2003-TolbaMGA #algorithm #analysis #image #multi #segmentation #using
MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
ICEISICEIS-v2-2003-Zarri #information management #representation #semantics #using #web
Semantic Annotations and Semantic Web Using NKRL (Narrative Knowledge Representation Language) (GPZ), pp. 387–394.
ICEISICEIS-v2-2003-ZhengE #automation #documentation #summary #using #web
Using Specialized Knowledge in Automated Web Document Summarization (ZZ, GE), pp. 579–582.
ICEISICEIS-v3-2003-AllouiMO #approach #architecture #generative #modelling #using
Modelling and Generating Business-To-Business Applications Using an Architecture Description Language — Based Approach (IA, KM, FO), pp. 201–210.
ICEISICEIS-v3-2003-CarchioloLM #specification #using #workflow
Using Lotos in Workflow Specification (VC, AL, MM), pp. 364–369.
ICEISICEIS-v3-2003-CaveroMVC #modelling #query #uml #using
Modelling ORDB Queries Using UML (JMC, EM, BV, CC), pp. 535–539.
ICEISICEIS-v3-2003-DarrasGP #deployment #enterprise #using
Using Model of Enterprise and Software for Deployment of ERP Software (FD, PG, HP), pp. 558–565.
ICEISICEIS-v3-2003-Govaere
Prescribed Impacts and Impacts Stipulated for Ics: The Gap Between the Possibilities and the Use of Ics (VG), pp. 590–593.
ICEISICEIS-v3-2003-Honkaranta #content management #documentation #enterprise #lens #using
Developing Document and Content Management in Enterprises Using a “Genre Lens” (AH), pp. 334–340.
ICEISICEIS-v3-2003-MangoldRM #named #semistructured data #using
Föderal: Management of Engineering Data Using a Semistructured Data Model (CM, RR, BM), pp. 382–389.
ICEISICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
ICEISICEIS-v3-2003-RuiRB #case study #modelling #refactoring
Refactoring Use Case Models: A Case Study (KR, SR, GB), pp. 239–244.
ICEISICEIS-v3-2003-ShishkovD #case study #process
Deriving Use Cases From Business Processes, the Advantages of Demo (BS, JLGD), pp. 138–146.
ICEISICEIS-v3-2003-YamaguchiWS #design #petri net #reliability #using
A High Reliability Design for Nfs Server Software By Using an Extended Petri Net (SY, KW, YS), pp. 498–502.
ICEISICEIS-v4-2003-BalavijendranCM #experience #personalisation #using
Enhancing News Reading Experience Through Personalization of News Content and Services Using Intelligent Agents (LB, SNC, AKM), pp. 404–407.
ICEISICEIS-v4-2003-KoideNKGM #scalability #using
Operation-Support System for Large-Scale System Using Information Technology (SK, HN, YK, AG, RM), pp. 430–437.
ICEISICEIS-v4-2003-LimP #clustering #using #web
Dynamically Reconstructive Web Server Cluster Using a Hierarchical Grouping Mechanism (SiL, MSP), pp. 271–279.
ICEISICEIS-v4-2003-LopesO #distributed #using
Application Scenarios for Distributed Management Using Snmp Expressions (RPL, JLO), pp. 49–54.
ICEISICEIS-v4-2003-NagaoK #architecture #evaluation #using #web #web service
Evaluation of Mainframe Computer System Using Web Service Architecture (MN, YK), pp. 460–463.
ICEISICEIS-v4-2003-Oriogun #analysis #case study #online #re-engineering #reliability #using
Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
ICEISICEIS-v4-2003-PennacchioR #automation #e-commerce #mobile #using
Automatic E-Commerce Using a Mobile Agents Model (SP, FMR), pp. 468–472.
ICEISICEIS-v4-2003-SonneckM #graph #personalisation #using #web
One-To-One Personalization of Web Applications Using a Graph Based Model (GS, TAM), pp. 95–102.
CIKMCIKM-2003-BeitzelJCG #automation #evaluation #taxonomy #using
Using titles and category names from editor-driven taxonomies for automatic evaluation (SMB, ECJ, AC, DAG), pp. 17–23.
CIKMCIKM-2003-BillerbeckSWZ #query #using
Query expansion using associated queries (BB, FS, HEW, JZ), pp. 2–9.
CIKMCIKM-2003-BroderCHSZ #evaluation #performance #process #query #retrieval #using
Efficient query evaluation using a two-level retrieval process (AZB, DC, MH, AS, JYZ), pp. 426–434.
CIKMCIKM-2003-CampbellMCD #email #identification #using
Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
CIKMCIKM-2003-LinK #mining #using #web
Question answering from the web using knowledge annotation and knowledge mining techniques (JJL, BK), pp. 116–123.
CIKMCIKM-2003-MayfieldMPP #using
Lattice-based tagging using support vector machines (JM, PM, CDP, CP), pp. 303–308.
CIKMCIKM-2003-OgrasF #approximate #reduction #using
Dimensionality reduction using magnitude and shape approximations (ÜYO, HF), pp. 99–107.
CIKMCIKM-2003-RadevT #evaluation #summary #using
Summarization evaluation using relative utility (DRR, DT), pp. 508–511.
CIKMCIKM-2003-WuSC #performance #web
Finding more useful information faster from web search results (YfBW, LS, XC), pp. 568–571.
CIKMCIKM-2003-ZhangOR #learning #using
Learning cross-document structural relationships using boosting (ZZ, JO, DRR), pp. 124–130.
ECIRECIR-2003-Bigi #categorisation #distance #using
Using Kullback-Leibler Distance for Text Categorization (BB), pp. 305–319.
ECIRECIR-2003-CachedaCGV #data type #hybrid #optimisation #strict #using #web
Optimization of Restricted Searches in Web Directories Using Hybrid Data Structures (FC, VC, CG, ÁV), pp. 436–451.
ECIRECIR-2003-DominichGS #case study #query #web
A Study of the Usefulness of Institutions’ Acronyms as Web Queries (SD, JG, AS), pp. 580–587.
ECIRECIR-2003-FisherE #classification
When Are Links Useful? Experiments in Text Classification (MF, RME), pp. 41–56.
ECIRECIR-2003-XuYTXW #classification #using
Representative Sampling for Text Classification Using Support Vector Machines (ZX, KY, VT, XX, JW), pp. 393–407.
ICMLICML-2003-Bar-HillelHSW #distance #equivalence #learning #using
Learning Distance Functions using Equivalence Relations (ABH, TH, NS, DW), pp. 11–18.
ICMLICML-2003-BrownW #ambiguity #composition #learning #network
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods (GB, JLW), pp. 67–74.
ICMLICML-2003-Elkan #difference #using
Using the Triangle Inequality to Accelerate k-Means (CE), pp. 147–153.
ICMLICML-2003-Harrington #algorithm #collaboration #online #ranking #using
Online Ranking/Collaborative Filtering Using the Perceptron Algorithm (EFH), pp. 250–257.
ICMLICML-2003-LachicheF #classification #multi #probability #using
Improving Accuracy and Cost of Two-class and Multi-class Probabilistic Classifiers Using ROC Curves (NL, PAF), pp. 416–423.
ICMLICML-2003-LeeL #learning #using
Learning with Positive and Unlabeled Examples Using Weighted Logistic Regression (WSL, BL), pp. 448–455.
ICMLICML-2003-LiWL #classification #generative #keyword #probability #using
Text Classification Using Stochastic Keyword Generation (CL, JRW, HL), pp. 464–471.
ICMLICML-2003-McGovernJ #identification #learning #multi #predict #relational #using
Identifying Predictive Structures in Relational Data Using Multiple Instance Learning (AM, DJ), pp. 528–535.
ICMLICML-2003-Mesterharm #algorithm #multi #using
Using Linear-threshold Algorithms to Combine Multi-class Sub-experts (CM), pp. 544–551.
ICMLICML-2003-PerkinsT #feature model #online #using
Online Feature Selection using Grafting (SP, JT), pp. 592–599.
ICMLICML-2003-ZhuGL #learning #using
Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions (XZ, ZG, JDL), pp. 912–919.
KDDKDD-2003-AliK #clustering #divide and conquer #using #web
Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
KDDKDD-2003-BilenkoM #adaptation #detection #metric #similarity #string #using
Adaptive duplicate detection using learnable string similarity measures (MB, RJM), pp. 39–48.
KDDKDD-2003-CasaliCL #semantics #using
Extracting semantics from data cubes using cube transversals and closures (AC, RC, LL), pp. 69–78.
KDDKDD-2003-DuZ #data mining #mining #privacy #random #using
Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
KDDKDD-2003-EirinakiVV #named #personalisation #process #semantics #taxonomy #using #web
SEWeP: using site semantics and a taxonomy to enhance the Web personalization process (ME, MV, IV), pp. 99–108.
KDDKDD-2003-SripadaRHY #generative #summary #using
Generating English summaries of time series data using the Gricean maxims (SS, ER, JH, JY), pp. 187–196.
KDDKDD-2003-SteinbachTKKP #clustering #using
Discovery of climate indices using clustering (MS, PNT, VK, SAK, CP), pp. 446–455.
KDDKDD-2003-TaoMF #framework #mining #using
Weighted Association Rule Mining using weighted support and significance framework (FT, FM, MMF), pp. 661–666.
KDDKDD-2003-WangFYH #classification #concept #data type #mining #using
Mining concept-drifting data streams using ensemble classifiers (HW, WF, PSY, JH), pp. 226–235.
KDDKDD-2003-YuYH #clustering #scalability #set #using
Classifying large data sets using SVMs with hierarchical clusters (HY, JY, JH), pp. 306–315.
KDDKDD-2003-ZakiG #mining #performance #using
Fast vertical mining using diffsets (MJZ, KG), pp. 326–335.
MLDMMLDM-2003-Barsi #graph #self #using
Neural Self-Organization Using Graphs (AB), pp. 343–352.
MLDMMLDM-2003-BicegoMF #clustering #markov #modelling #sequence #similarity #using
Similarity-Based Clustering of Sequences Using Hidden Markov Models (MB, VM, MATF), pp. 86–95.
MLDMMLDM-2003-DeventerDNK #modelling #testing #using
Using Test Plans for Bayesian Modeling (RD, JD, HN, OK), pp. 307–316.
MLDMMLDM-2003-KimJ #network #using
Using Bayesian Networks to Analyze Medical Data (ICK, YGJ), pp. 317–327.
MLDMMLDM-2003-LazliS #fuzzy #logic #probability #recognition #speech #using
Connectionist Probability Estimators in HMM Arabic Speech Recognition Using Fuzzy Logic (LL, MS), pp. 379–388.
MLDMMLDM-2003-MagnussonV #network #sequence #using #visualisation
Visualizing Sequences of Texts Using Collocational Networks (CM, HV), pp. 276–283.
MLDMMLDM-2003-MiteranBB #approximate #bound #classification #image #realtime #segmentation #using
Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
MLDMMLDM-2003-TanakaU #analysis #component #multi #principle #using
Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
SEKESEKE-2003-AstesianoMMR #execution #multi #prototype #specification
From Requirement Specification to Prototype Execution: a Combination of Multiview Use-Case Driven Methods and Agent-Oriented Techniques (EA, MM, VM, GR), pp. 578–585.
SEKESEKE-2003-BarberL #architecture #framework #specification #using
Specifying and Analyzing Agent Architectures using the Agent Competency Framework (KSB, DNL), pp. 232–239.
SEKESEKE-2003-Cebulla #adaptation #architecture #reasoning #using #variability
Reasoning about Variability and structural Adaptation in Sociotechnical Systems Using Dynamic Architectures (MC), pp. 406–413.
SEKESEKE-2003-GomesPPSCFB #design pattern #reuse #using
Selection and Reuse of Software Design Patterns Using CBR and WordNet (PG, FCP, PP, NS, PC, JLF, CB), pp. 289–296.
SEKESEKE-2003-JiangH #using
Exploring UDDI Registries Using Modified OFDAV Browser (BJ, MLH), pp. 119–123.
SEKESEKE-2003-MunchHD #clustering
A Practical Way to Use Clustering and Context Knowledge for Software Project Planning (JM, JH, AD), pp. 377–384.
SEKESEKE-2003-NetiniantiE #approach #aspect-oriented #using #verification
Adding Verification Property of Inter-Processes Using Aspect-Oriented Approach (PN, TE), pp. 54–60.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #risk management #using
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
SEKESEKE-2003-PeriniS #design #using
Dealing with software design issues using an Agent-Oriented methodology (AP, AS), pp. 224–231.
SEKESEKE-2003-SouzaORGR #consistency #detection #modelling #nondeterminism #re-engineering #using
Using Critiquing Systems for Inconsistency Detection in Software Engineering Models (CRBdS, HLRO, CRPdR, KMG, DFR), pp. 196–203.
SEKESEKE-2003-ThwinQ #maintenance #metric #network #object-oriented #using
Application of Neural Networks for Estimating Software Maintainability Using Object-Oriented Metrics (MMTT, TSQ), pp. 69–73.
SIGIRSIGIR-2003-Anick #feedback #refinement #using #web
Using terminological feedback for web search refinement: a log-based study (PGA), pp. 88–95.
SIGIRSIGIR-2003-BeitzelJCGF #automation #evaluation #retrieval #using #web
Using manually-built web directories for automatic evaluation of known-item retrieval (SMB, ECJ, AC, DAG, OF), pp. 373–374.
SIGIRSIGIR-2003-Bennett #classification #probability #symmetry #using
Using asymmetric distributions to improve text classifier probability estimates (PNB), pp. 111–118.
SIGIRSIGIR-2003-Broder #graph #modelling #using #web
Keynote Address — exploring, modeling, and using the web graph (AZB), p. 1.
SIGIRSIGIR-2003-BruzaS #comparison #dependence #modelling #probability #using
A comparison of various approaches for using probabilistic dependencies in language modeling (PB, DS), pp. 419–420.
SIGIRSIGIR-2003-ChoiK #concept #topic #using
Topic distillation using hierarchy concept tree (IC, MK), pp. 371–372.
SIGIRSIGIR-2003-DumaisCCJSR #information retrieval
Stuff I’ve seen: a system for personal information retrieval and re-use (STD, EC, JJC, GJ, RS, DCR), pp. 72–79.
SIGIRSIGIR-2003-JeonLM #automation #image #modelling #retrieval #using
Automatic image annotation and retrieval using cross-media relevance models (JJ, VL, RM), pp. 119–126.
SIGIRSIGIR-2003-JiZ #independence #programming #segmentation #using
Domain-independent text segmentation using anisotropic diffusion and dynamic programming (XJ, HZ), pp. 322–329.
SIGIRSIGIR-2003-LinNNNSTNA #multimodal #using #video
User-trainable video annotation using multimodal cues (CYL, MRN, AN, CN, JRS, BLT, HJN, WHA), pp. 403–404.
SIGIRSIGIR-2003-PintoMWC #random #using
Table extraction using conditional random fields (DP, AM, XW, WBC), pp. 235–242.
SIGIRSIGIR-2003-TeevanK #analysis #development #empirical #exponential #probability #retrieval #using
Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
SIGIRSIGIR-2003-TsaiMT #classification #hybrid #image #network #using
Image classification using hybrid neural networks (CFT, KM, JT), pp. 431–432.
SIGIRSIGIR-2003-YangCWK
Structured use of external knowledge for event-based open domain question answering (HY, TSC, SW, CKK), pp. 33–40.
SIGIRSIGIR-2003-YuJR #keyword #query #using #xml
Querying XML using structures and keywords in timber (CY, HVJ, DRR), p. 463.
SIGIRSIGIR-2003-ZhangL #classification #using
Question classification using support vector machines (DZ, WSL), pp. 26–32.
UMLUML-2003-AlghathbarW #case study #consistency #data access #policy
Consistent and Complete Access Control Policies in Use Cases (KA, DW), pp. 373–387.
UMLUML-2003-DologN #adaptation #generative #navigation #sequence #uml #using #xmi
Using UML and XMI for Generating Adaptive Navigation Sequences in Web-Based Systems (PD, WN), pp. 205–219.
UMLUML-2003-Isoda #uml
A Critique of UML’s Definition of the Use-Case Class (SI), pp. 280–294.
UMLUML-2003-StraetenMSJ #consistency #logic #maintenance #modelling #uml #using
Using Description Logic to Maintain Consistency between UML Models (RVDS, TM, JS, VJ), pp. 326–340.
OOPSLAOOPSLA-2003-TipKB #constraints #refactoring #using
Refactoring for generalization using type constraints (FT, AK, DB), pp. 13–26.
GPCEGPCE-2003-CalcagnoTHL #abstract syntax tree #implementation #multi #using
Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection (CC, WT, LH, XL), pp. 57–76.
GPCEGPCE-2003-ChibaN #bytecode #java #performance #tool support
An Easy-to-Use Toolkit for Efficient Java Bytecode Translators (SC, MN), pp. 364–376.
LOPSTRLOPSTR-2003-BerghammerM #algorithm #approximate #development #using #verification
Formal Development and Verification of Approximation Algorithms Using Auxiliary Variables (RB, MMO), pp. 59–74.
LOPSTRLOPSTR-2003-LehmannL #generative #induction #proving #theorem proving #using
Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
PADLPADL-2003-ErdemLNR #programming #set #using
Reconstructing the Evolutionary History of Indo-European Languages Using Answer Set Programming (EE, VL, LN, DR), pp. 160–176.
POPLPOPL-2003-GulwaniN #random #using
Discovering affine equalities using random interpretation (SG, GCN), pp. 74–84.
REFSQREFSQ-J-2002-CrookIN03 #modelling #policy #requirements #using
Modelling access policies using roles in requirements engineering (RC, DCI, BN), pp. 979–991.
RERE-2003-AlspaughA #analysis #case study
Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System (TAA, AIA), pp. 355–356.
RERE-2003-Barnes #ambiguity #convergence #design #process #requirements #using
Using Convergent Design Processes to Surface Hidden Ambiguity and Conflict in Requirements (RJB), p. 281.
RERE-2003-BushF #assessment #requirements #using
Requirements Stability Assessment Using Scenarios (DB, AF), pp. 23–32.
RERE-2003-MaidenJF #case study #requirements #specification
Integrating RE Methods to Support Use Case Based Requirements Specification (NAMM, SJ, MF), pp. 369–370.
RERE-2003-RichardsFA #approach #case study #multi #visualisation
An Approach to Visualise and Reconcile Use Case Descriptions from Multiple Viewpoints (DR, ABF, OA), pp. 373–374.
RERE-2003-RifautMMPSLV #analysis #formal method #named #specification #tool support #using
FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
RERE-2003-SenguptaC #modelling #requirements #sequence chart #using
Refinement-Based Requirements Modeling Using TriggeredMessage Sequence Charts (BS, RC), pp. 95–104.
SACSAC-2003-CanWWS #3d #java #named #performance #using #visualisation
FPV: Fast Protein Visualization Using Java 3D (TC, YW, YFW, JS), pp. 88–95.
SACSAC-2003-Cerrito #estimation #kernel #using #visualisation
Data Visualization Using Kernel Density Estimation to Examine Patterns of Physician Practice (PBC), pp. 275–279.
SACSAC-2003-FenicleW
A Methodology to Provide and Use Interchangeable Services (BF, TW), pp. 1140–1146.
SACSAC-2003-Gee #semantics #using
Using Latent Semantic Indexing to Filter Spam (KRG), pp. 460–464.
SACSAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance #using
ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
SACSAC-2003-KaramHGR #evaluation #image #retrieval #using
Enhancement of Wavelet-Based Medical Image Retrieval Through Feature Evaluation Using an Information Gain Measure (OHK, AMH, SG, SR), pp. 220–226.
SACSAC-2003-KimP #replication #using #xml #xquery
Xquery Speedup Using Replication in Mapping XML into Relations (JK, SP), pp. 536–543.
SACSAC-2003-MaI #using
Long Time Step Molecular Dynamics using Targeted Langevin Stabilization (QM, JAI), pp. 178–182.
SACSAC-2003-NaganumaTM #3d #estimation #image #multi #using
Estimation of 3D Shape and Reflectance using Multiple Moire Images and Shading Model (SN, NT, AM), pp. 943–950.
SACSAC-2003-NittoGS #multi #using #web
Using Agents for Multi-target Search on the Web (EDN, CG, PS), pp. 828–833.
SACSAC-2003-Wainer #hardware #interactive #standard #using #visualisation
Interactive Computation and Visualization of Fetch Using Standard Computer Graphics Hardware (MW), pp. 961–965.
SACSAC-2003-Weyuker #testing #using
Using Operational Distributions to Judge Testing Progress (EJW), pp. 1118–1122.
SACSAC-2003-XiangYSRS #quantifier #using
Quantification of Trabecular Bone Mass and Orientation Using Gabor Wavelets (YX, VY, JS, TR, MBS), pp. 183–188.
SACSAC-2003-YangH #classification #data flow #image #using
Image Texture Classification Using Datagrams and Characteristic Views (SY, CCH), pp. 22–26.
SACSAC-2003-YuNPC #classification #on the #testing
On the Use of the Classification-Tree Method by Beginning Software Testers (YTY, SPN, PLP, TYC), pp. 1123–1127.
SACSAC-2003-ZhuHY #network #using #web
Recognizing the Relations between Web Pages Using Artificial Neural Network (XZ, SH, YY), pp. 1217–1221.
ESEC-FSEESEC-FSE-2003-BertolinoG #case study #product line #testing
Use case-based testing of product lines (AB, SG), pp. 355–358.
ESEC-FSEESEC-FSE-2003-CangussuDM #approach #monitoring #process #statistics #testing #using
Monitoring the software test process using statistical process control: a logarithmic approach (JWC, RAD, APM), pp. 158–167.
ESEC-FSEESEC-FSE-2003-UchitelKM #behaviour #lts #using
Behaviour model elaboration using partial labelled transition systems (SU, JK, JM), pp. 19–27.
ESEC-FSEESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
ICSEICSE-2003-BagertM #education #process #re-engineering #using
Using a Web-Based Project Process Throughout the Software Engineering Curriculum (DJB, SAM), pp. 634–640.
ICSEICSE-2003-Kylmakoski #agile #authoring #documentation #performance #using
Efficient Authoring of Software Documentation Using RaPiD7 (RK), pp. 255–261.
ICSEICSE-2003-MarcusM #semantics #traceability #using
Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing (AM, JIM), pp. 125–137.
ICSEICSE-2003-SimEH #benchmark #challenge #metric #re-engineering #research #using
Using Benchmarking to Advance Research: A Challenge to Software Engineering (SES, SME, RCH), pp. 74–83.
ICSEICSE-2003-ValettoK #adaptation #coordination #process #using
Using Process Technology to Control and Coordinate Software Adaptation (GV, GEK), pp. 262–273.
CCCC-2003-GagnonH #bytecode #effectiveness #java #sequence #thread #using
Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences (EG, LJH), pp. 170–184.
CCCC-2003-JohnsonM #dependence #graph #using
Combined Code Motion and Register Allocation Using the Value State Dependence Graph (NJ, AM), pp. 1–16.
CCCC-2003-LhotakH #analysis #java #points-to #scalability #using
Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
CCCC-2003-Reeuwijk #agile #compilation #robust #using
Rapid and Robust Compiler Construction Using Template-Based Metacompilation (KvR), pp. 247–261.
CGOCGO-2003-ChenHC #hardware #monitoring #performance #using
Dynamic Trace Selection Using Performance Monitoring Hardware Sampling (HC, WCH, DyC), pp. 79–90.
CGOCGO-2003-DehnertGBJKKM #adaptation #challenge #using
The Transmeta Code Morphing — Software: Using Speculation, Recovery, and Adaptive Retranslation to Address Real-Life Challenges (JCD, BG, JPB, RJ, TK, AK, JM), pp. 15–24.
CGOCGO-2003-LinCHY #using
Speculative Register Promotion Using Advanced Load Address Table (ALAT) (JL, TC, WCH, PCY), pp. 125–134.
HPDCHPDC-2003-Cuenca-AcunaPMN #community #information management #named #peer-to-peer #using
PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities (FMCA, CP, RPM, TDN), pp. 236–249.
HPDCHPDC-2003-IvanK #component #framework #reuse #using
Using Views for Customizing Reusable Components in Component-Based Frameworks (AAI, VK), pp. 194–204.
HPDCHPDC-2003-SundaresanLKPS #adaptation #grid #monitoring #using
Adaptive Polling of Grid Resource Monitors Using a Slacker Coherence Model (RS, ML, TMK, SP, JHS), pp. 260–269.
LCTESLCTES-2003-Krishnaswamy #performance #using
Enhancing the performance of 16-bit code using augmenting instructions (AK, RG), pp. 254–264.
PPoPPPPoPP-2003-FrensW #matrix #memory management #parallel
Factorization with morton-ordered quadtree matrices for memory re-use and parallelism (JDF, DSW), pp. 144–154.
PPoPPPPoPP-2003-PrabhuO #concurrent #parallel #thread #using
Using thread-level speculation to simplify manual parallelization (MKP, KO), pp. 1–12.
PPoPPPPoPP-2003-Puppin #adaptation #convergence #machine learning #scheduling #using
Adapting convergent scheduling using machine learning (DP), p. 1.
PPoPPPPoPP-2003-TanSSAM #design pattern #distributed #generative #memory management #parallel #using
Using generative design patterns to generate parallel code for a distributed memory environment (KT, DS, JS, JA, SM), pp. 203–215.
SOSPSOSP-2003-KosticRAV #named #using
Bullet: high bandwidth data dissemination using an overlay mesh (DK, AR, JRA, AV), pp. 282–297.
SOSPSOSP-2003-PatelWWLS #mobile #protocol #using
Upgrading transport protocols using untrusted mobile code (PP, AW, DW, JL, TS), pp. 1–14.
CAVCAV-2003-BoigelotHJ #automaton #hybrid #using
Hybrid Acceleration Using Real Vector Automata (Extended Abstract) (BB, FH, SJ), pp. 193–205.
CAVCAV-2003-ColonSS #constraints #generative #invariant #linear #theorem proving #using
Linear Invariant Generation Using Non-linear Constraint Solving (MC, SS, HS), pp. 420–432.
CAVCAV-2003-FlanaganJOS #lazy evaluation #proving #theorem proving #using
Theorem Proving Using Lazy Proof Explication (CF, RJ, XO, JBS), pp. 355–367.
CAVCAV-2003-SeshiaB #automaton #bound #model checking #using
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
FATESFATES-2003-BadriBN #approach #case study #collaboration #diagrams #formal method #process #testing #towards #uml
A Use Case Driven Testing Process: Towards a Formal Approach Based on UML Collaboration Diagrams (MB, LB, MN), pp. 223–235.
FATESFATES-2003-GuoHHD #algorithm #search-based #sequence #using
Computing Unique Input/Output Sequences Using Genetic Algorithms (QG, RMH, MH, KD), pp. 164–177.
FATESFATES-2003-HahnleW #proving #testing #theorem proving #using
Using a Software Testing Technique to Improve Theorem Proving (RH, AW), pp. 30–41.
FATESFATES-2003-HeimdahlRVDG #case study #model checking #sequence #testing #using
Auto-generating Test Sequences Using Model Checkers: A Case Study (MPEH, SR, WV, GD, JG), pp. 42–59.
FATESFATES-2003-HesselLNPS #generative #realtime #testing #using
Time-Optimal Real-Time Test Case Generation Using Uppaal (AH, KGL, BN, PP, AS), pp. 114–130.
FATESFATES-2003-SungC #embedded #fault #hardware #injection #interactive #testing #using
Interaction Testing in an Embedded System Using Hardware Fault Injection and Program Mutation (AS, BC), pp. 192–204.
RTARTA-2003-KapurNW #algorithm #composition #protocol
An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
ICSTSAT-2003-LiSB #effectiveness #performance #satisfiability #using
A Local Search SAT Solver Using an Effective Switching Strategy and an Efficient Unit Propagation (XYL, MFMS, FB), pp. 53–68.
ICSTSAT-2003-SabharwalBK #learning #performance #problem #using
Using Problem Structure for Efficient Clause Learning (AS, PB, HAK), pp. 242–256.
ICTSSTestCom-2003-RanganathanDM #protocol #testing #using #xml
Testing SIP Call Flows Using XML Protocol Templates (MR, OD, DM), pp. 33–48.
VMCAIVMCAI-2003-Monniaux #abstraction #using
Abstraction of Expectation Functions Using Gaussian Distributions (DM), pp. 161–173.
VMCAIVMCAI-2003-WinEGKL #algorithm #distributed #execution #using #verification
Using Simulated Execution in Verifying Distributed Algorithms (TNW, MDE, SJG, DKK, NAL), pp. 283–297.
VMCAIVMCAI-2003-YangRS #encoding #logic #mobile #model checking #process #using #π-calculus
A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution (PY, CRR, SAS), pp. 116–131.
CBSECBSE-2002-LarssonWNC #architecture #embedded #predict #product line #using
Using Prediction Enabled Technologies for Embedded Product Line Architectures (ML, AW, CN, IC), p. 12.
WICSAWICSA-2002-ChengGSSSS #architecture #self #using
Using Architectural Style as a Basis for System Self-repair (SWC, DG, BRS, JPS, BS, PS), pp. 45–59.
WICSAWICSA-2002-ShiH #architecture #communication #modelling #protocol #using
Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
CBSECBSE-2003-MehlitzP #design pattern #reliability #using #verification
Design for Verification: Using Design Patterns to Build Reliable Systems (PCM, JJP), p. 10.
ASEASE-2002-Al-DallalS #framework #object-oriented #testing #using
System Testing for Object-Oriented Frameworks Using Hook Technology (JAD, PGS), pp. 231–236.
ASEASE-2002-BarberGH #architecture #evaluation #non-functional #using
Enabling Iterative Software Architecture Derivation Using Early Non-Functional Property Evaluation (KSB, TJG, JH), pp. 172–182.
ASEASE-2002-BaudryFJT #adaptation #automation #component #dot-net #optimisation #testing #using
Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component (BB, FF, JMJ, YLT), pp. 253–256.
ASEASE-2002-GrosserSV #predict #reasoning #using
Predicting Software Stability Using Case-Based Reasoning (DG, HAS, PV), p. 295–?.
ASEASE-2002-GrundyD #aspect-oriented #automation #component #using #validation
Automatic Validation of Deployed J2EE Components Using Aspects (JCG, GD), p. 47–?.
DACDAC-2002-AbramoviciSE #embedded #using
Using embedded FPGAs for SoC yield improvement (MA, CES, ME), pp. 713–724.
DACDAC-2002-AnisMEA #automation #clustering #performance #power management #reduction #using
Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique (MA, MM, MIE, SA), pp. 480–485.
DACDAC-2002-AttarhaN #analysis #fault #modelling #using
Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
DACDAC-2002-BadarogluTDWMVG #optimisation #reduction #using
Clock tree optimization in synchronous CMOS digital circuits for substrate noise reduction using folding of supply current transients (MB, KT, SD, PW, HDM, IV, GGEG), pp. 399–404.
DACDAC-2002-BernardiS #design #library #using
Model design using hierarchical web-based libraries (FB, JFS), pp. 14–17.
DACDAC-2002-ChandraC #reduction #testing #using
Reduction of SOC test data volume, scan power and testing time using alternating run-length codes (AC, KC), pp. 673–678.
DACDAC-2002-JiangB #logic #simulation #specification #synthesis #using
Software synthesis from synchronous specifications using logic simulation techniques (YJ, RKB), pp. 319–324.
DACDAC-2002-KapurCS #estimation #novel #optimisation #reduction #using
Power estimation in global interconnects and its reduction using a novel repeater optimization methodology (PK, GC, KS), pp. 461–466.
DACDAC-2002-LiouWCDMKW #fault #multi #performance #testing #using
Enhancing test efficiency for delay fault testing using multiple-clocked schemes (JJL, LCW, KTC, JD, MRM, RK, TWW), pp. 371–374.
DACDAC-2002-MadesG #graph #modelling #using
Regularization of hierarchical VHDL-AMS models using bipartite graphs (JM, MG), pp. 548–551.
DACDAC-2002-PeymandoustMS #algebra #embedded #library #using
Complex library mapping for embedded software using symbolic algebra (AP, GDM, TS), pp. 325–330.
DACDAC-2002-RaganSS #co-evolution #concurrent #cost analysis #design #hardware
A detailed cost model for concurrent use with hardware/software co-design (DR, PS, PS), pp. 269–274.
DACDAC-2002-ShengTH #effectiveness #safety #using
Effective safety property checking using simulation-based sequential ATPG (SS, KT, MSH), pp. 813–818.
DACDAC-2002-Sotiriou #implementation #using
Implementing asynchronous circuits using a conventional EDA tool-flow (CPS), pp. 415–418.
DACDAC-2002-WirthlinM #using
IP delivery for FPGAs using Applets and JHDL (MJW, BM), pp. 2–7.
DACDAC-2002-YangP #component #multi #simulation #using
Time-domain steady-state simulation of frequency-dependent components using multi-interval Chebyshev method (BY, JRP), pp. 504–509.
DACDAC-2002-ZengAA #identification #using
False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
DATEDATE-2002-AloulMS #satisfiability #search-based #using
Search-Based SAT Using Zero-Suppressed BDDs (FAA, MNM, KAS), p. 1082.
DATEDATE-2002-AzevedoICGDVN #scheduling #using
Profile-Based Dynamic Voltage Scheduling Using Program Checkpoints (AA, II, RC, RG, NDD, AVV, AN), pp. 168–175.
DATEDATE-2002-BecerZBPH #analysis #using
Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
DATEDATE-2002-BeroulleBLN #on the
On the Use of an Oscillation-Based Test Methodology for CMOS Micro-Electro-Mechanical Systems (VB, YB, LL, PN), p. 1120.
DATEDATE-2002-BhuniaR #analysis #detection #fault #using
Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
DATEDATE-2002-BrachtendorfLLMF #continuation #using
Steady State Calculation of Oscillators Using Continuation Methods (HGB, SL, RL, RCM, PF), p. 1139.
DATEDATE-2002-CaiGKO #design #top-down #using
Top-Down System Level Design Methodology Using SpecC, VCC and SystemC (LC, DG, PK, MO), p. 1137.
DATEDATE-2002-ChenBKR #reduction #using
Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods (YC, VB, CKK, KR), pp. 931–935.
DATEDATE-2002-CoelhoSP #algorithm #approximate #using
Passive Constrained Rational Approximation Algorithm Using Nevanlinna-Pick Interpolation (CPC, LMS, JRP), pp. 923–930.
DATEDATE-2002-DingM02a #modelling #using
Accurate Estimating Simultaneous Switching Noises by Using Application Specific Device Modeling (LD, PM), pp. 1038–1043.
DATEDATE-2002-EdwardsG #embedded #modelling #using
The Modelling of Embedded Systems Using HASoC (MDE, PNG), pp. 752–759.
DATEDATE-2002-FerrandiRS #constraints #functional #theorem proving #using #verification
Functional Verification for SystemC Descriptions Using Constraint Solving (FF, MR, DS), pp. 744–751.
DATEDATE-2002-FerrettiB #encoding #pipes and filters #using
Single-Track Asynchronous Pipeline Templates Using 1-of-N Encoding (MF, PAB), pp. 1008–1015.
DATEDATE-2002-GoffioulWVD #analysis #approach #architecture #using
Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
DATEDATE-2002-GoldbergPB #algorithm #problem #satisfiability #symmetry #using
Using Problem Symmetry in Search Based Satisfiability Algorithms (EIG, MRP, RKB), pp. 134–141.
DATEDATE-2002-HalambiSBDN #compilation #performance #reduction #using
An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
DATEDATE-2002-Kania #approach #multi #using
Improved Technology Mapping for PAL-Based Devices Using a New Approach to Multi-Output Boolean Functions (DK), p. 1087.
DATEDATE-2002-KhomenkoKY #detection #integer #programming #using
Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
DATEDATE-2002-KimKM #algorithm #analysis #realtime #scalability #using
A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
DATEDATE-2002-LinCC #using
Arbitrary Convex and Concave Rectilinear Module Packing Using TCG (JML, HLC, YWC), pp. 69–75.
DATEDATE-2002-NitschK #embedded #runtime
The Use of Runtime Configuration Capabilities for Networked Embedded Systems (CN, UK), p. 1093.
DATEDATE-2002-PeymandoustSM #algebra #embedded #optimisation #power management #using
Low Power Embedded Software Optimization Using Symbolic Algebra (AP, TS, GDM), pp. 1052–1058.
DATEDATE-2002-PomeranzR #fault #multi #set #using
Test Enrichment for Path Delay Faults Using Multiple Sets of Target Faults (IP, SMR), pp. 722–729.
DATEDATE-2002-PomeranzZ #fault #testing #using
Fault Isolation Using Tests for Non-Isolated Blocks (IP, YZ), p. 1123.
DATEDATE-2002-SchwenckerSPG #adaptation #parametricity #set #using #worst-case
Analog Circuit Sizing Using Adaptive Worst-Case Parameter Sets (RS, FS, MP, HEG), pp. 581–585.
DATEDATE-2002-SkliarovaF #configuration management #hardware #satisfiability #using
A SAT Solver Using Software and Reconfigurable Hardware (IS, AdBF), p. 1094.
DATEDATE-2002-VanasscheGS #behaviour #matrix #modelling #using
Constructing Symbolic Models for the Input/Output Behavior of Periodically Time-Varying Systems Using Harmonic Transfer Matrices (PV, GGEG, WMCS), pp. 279–284.
DATEDATE-2002-Velev #similarity #using #verification
Using Rewriting Rules and Positive Equality to Formally Verify Wide-Issue Out-of-Order Microprocessors with a Reorder Buffer (MNV), pp. 28–35.
DATEDATE-2002-WilsonRZBK #behaviour #fault #modelling #using
Behavioural Modelling of Operational Amplifier Faults Using VHDL-AMS (PRW, JNR, MZ, ADB, YK), p. 1133.
DATEDATE-2002-ZhaoMB #compilation #design #modelling #set #using
Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models (QZ, BM, TB), pp. 1021–1026.
DocEngDocEng-2002-AllierE #approach #image #using
Degraded character image restoration using active contours: a first approach (BA, HE), pp. 142–148.
HTHT-2002-SinclairMMW #artificial reality #hypermedia #using
Links in the palm of your hand: tangible hypermedia using augmented reality (PASS, KM, DEM, MJW), pp. 127–136.
HTHT-2002-WangH #distributed #hypermedia #using #visual notation
Supporting distributed meetings using cooperative, visual, process-enabled hypermedia (WW, JMH), pp. 147–148.
HTHT-2002-Whitehead #comparison #modelling #using
Uniform comparison of data models using containment modeling (EJWJ), pp. 182–191.
HTHT-2002-ZhuHH #markov #modelling #predict #using #web
Using Markov models for web site link prediction (JZ, JH, JGH), pp. 169–170.
PODSPODS-2002-AfratiLM #query #using
Answering Queries Using Views with Arithmetic Comparisons (FNA, CL, PM), pp. 209–220.
PODSPODS-2002-SpielmannTB #automaton #distributed #query #using #web
Distributed Computation of Web Queries Using Automata (MS, JT, JVdB), pp. 97–108.
SIGMODSIGMOD-2002-KanthRA #comparison #using
Quadtree and R-tree indexes in oracle spatial: a comparison using GIS data (KVRK, SR, DA), pp. 546–557.
SIGMODSIGMOD-2002-TatarinovVBSSZ #database #order #query #relational #using #xml
Storing and querying ordered XML using a relational database system (IT, SV, KSB, JS, EJS, CZ), pp. 204–215.
SIGMODSIGMOD-2002-TheobaldW #ontology #retrieval #using #xml
The XXL search engine: ranked retrieval of XML data using indexes and ontologies (AT, GW), p. 615.
SIGMODSIGMOD-2002-ZhouR #database #implementation #using
Implementing database operations using SIMD instructions (JZ, KAR), pp. 145–156.
VLDBVLDB-2002-AshwinGG #adaptation #similarity #using
Adaptable Similarity Search using Non-Relevant Information (TVA, RG, SG), pp. 47–58.
VLDBVLDB-2002-BrightR #using #web
Using Latency-Recency Profiles for Data Delivery on the Web (LB, LR), pp. 550–561.
VLDBVLDB-2002-ChoN #detection #effectiveness #using
Effective Change Detection Using Sampling (JC, AN), pp. 514–525.
VLDBVLDB-2002-ConradGJM #database #logic #physics #using
Database Selection Using Actual Physical and Acquired Logical Collection Resources in a Massive Domain-specific Operational Environment (JGC, XSG, PJ, MM), pp. 71–82.
VLDBVLDB-2002-CormodeDIM #data type #how #using
Comparing Data Streams Using Hamming Norms (How to Zero In) (GC, MD, PI, SM), pp. 335–345.
VLDBVLDB-2002-CosleyLP #framework #named #recommendation #testing #using
REFEREE: An Open Framework for Practical Testing of Recommender Systems using ResearchIndex (DC, SL, DMP), pp. 35–46.
VLDBVLDB-2002-GotoK #database #mobile #using
A New Passenger Support System for Public Transport using Mobile Database Access (KG, YK), pp. 908–919.
VLDBVLDB-2002-LamKR #mobile #monitoring #named #realtime #using
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies (KyL, AK, KR), pp. 1063–1066.
VLDBVLDB-2002-Mohan02a #performance #using
An Efficient Method for Performing Record Deletions and Updates Using Index Scans (CM), pp. 940–949.
VLDBVLDB-2002-OhuraTPK #internet #mining #query #using #web
Experiments on Query Expansion for Internet Yellow Page Services Using Web Log Mining (YO, KT, IP, MK), pp. 1008–1018.
CSEETCSEET-2002-BevanWM #guidelines #programming
Guidelines for the Use of Pair Programming in a Freshman Programming Class (JB, LLW, CEM), pp. 100–107.
CSEETCSEET-2002-FraileyM #education #industrial #source code #using
Using SWEBOK for Education Programs in Industry and Academia (DJF, JM), p. 6–?.
CSEETCSEET-2002-ThompsonE #documentation #education #re-engineering #using
Workshop 1: Developing Software Engineering Courses Using Computing Curriculum 2001 (CC 2001) Documentation (JBT, HME), pp. 260–261.
CSEETCSEET-2002-ThompsonH #evaluation #student
Use and Evaluation of SWEBOK by Postgraduate Students (JBT, CJH), pp. 66–77.
ITiCSEITiCSE-2002-Barros #concurrent #petri net #programming
Specific proposals for the use of petri nets in a concurrent programming course (JPB), pp. 165–167.
ITiCSEITiCSE-2002-Chalk #aspect-oriented #education #human-computer #learning
Evaluating the use of a virtual learning environment for teaching aspects of HCI (PC), pp. 125–129.
ITiCSEITiCSE-2002-GarciaM #how #learning #using
Learning how to develop software using the toy LEGO mindstorms (MAG, HPM), p. 239.
ITiCSEITiCSE-2002-RatteC #collaboration #industrial #on the #simulation #using #web
On using the web as a collaboration space in the context of an industrial simulation (SR, JC), pp. 141–145.
ITiCSEITiCSE-2002-SchepM #case study #experience #programming #using
Experiences with using robots in an all-female programming class (MS, NM), p. 241.
ITiCSEITiCSE-2002-ZupancicH
Lecture recording and its use in a traditional university course (BZ, HH), pp. 24–28.
FASEFASE-2002-BradfieldFS #calculus #ocl #using #μ-calculus
Enriching OCL Using Observational μ-Calculus (JCB, JKF, PS), pp. 203–217.
FASEFASE-2002-LopezLG #approach #automation #case study #generative #petri net #workflow
Automatic Generation of Use Cases from Workflows: A Petri Net Based Approach (OL, MAL, FJGP), pp. 279–293.
FASEFASE-2002-NonnengartRS #modelling #requirements #using
Formal Requirements Engineering Using Observer Models (AN, GR, WS), pp. 264–278.
FoSSaCSFoSSaCS-2002-SchoppS #process #using #verification
Verifying Temporal Properties Using Explicit Approximants: Completeness for Context-free Processes (US, AKS), pp. 372–386.
TACASTACAS-2002-AbdeddaimM #automaton #scheduling #using
Preemptive Job-Shop Scheduling Using Stopwatch Automata (YA, OM), pp. 113–126.
TACASTACAS-2002-BrabermanGO #using #verification
Improving the Verification of Timed Systems Using Influence Information (VAB, DG, AO), pp. 21–36.
TACASTACAS-2002-GodefroidK #algorithm #scalability #search-based #using
Exploring Very Large State Spaces Using Genetic Algorithms (PG, SK), pp. 266–280.
TACASTACAS-2002-KimSC #functional #requirements #specification #using #verification
Formal Verification of Functional Properties of an SCR-Style Software Requirements Specification Using PVS (TK, DWJSC, SDC), pp. 205–220.
TACASTACAS-2002-Lang #composition #using #verification
Compositional Verification Using SVL Scripts (FL), pp. 465–469.
WRLAWRLA-2002-DenkerM #communication #modelling #multi #protocol #term rewriting #using
Modeling Group Communication Protocols Using Multiset Term Rewriting (GD, JKM), pp. 20–39.
SCAMSCAM-J-2001-CordyDMS02 #re-engineering #txl #using
Source transformation in software engineering using the TXL transformation system (JRC, TRD, AJM, KAS), pp. 827–837.
CSMRCSMR-2002-AversanoCLG #case study #documentation #tool support #using #web #workflow #xml
Integrating Document and Workflow Management Tools using XML and Web Technologies: A Case Study (LA, GC, ADL, PG), p. 24–?.
CSMRCSMR-2002-Baburin #graph #re-engineering #using
Using Graph Based Representations in Reengineering (DEB), pp. 203–206.
CSMRCSMR-2002-HajnalF #algorithm #precise
A Precise Demand-Driven Def-Use Chaining Algorithm (ÁH, IF), p. 77–?.
CSMRCSMR-2002-YuSM #case study #industrial #metric #object-oriented #predict #using
Predicting Fault-Proneness using OO Metrics: An Industrial Case Study (PY, TS, HAM), pp. 99–107.
ICSMEICSM-2002-Harrison #adaptation #case study #maintenance #using #web #web service
Using Service Specific Proxies to Migrate Web Services to the “Wireless Web”: An Illustrative Case Study of Adaptive Maintenance (WH), pp. 300–309.
ICSMEICSM-2002-KorelTV #analysis #dependence #modelling #reduction #testing #using
Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
ICSMEICSM-2002-MoeS #distributed #execution #using
Using Execution Trace Data to Improve Distributed Systems (JM, KS), pp. 640–648.
ICSMEICSM-2002-MullerTH #programming
Two Controlled Experiments Concerning the Usefulness of Assertions as a Means for Programming (MMM, RT, OH), pp. 84–92.
ICSMEICSM-2002-RichnerD #information management #using
Using Dynamic Information for the Iterative Recovery of Collaborations and Roles (TR, SD), pp. 34–43.
ICSMEICSM-2002-Torchiano #java #source code
Documenting Pattern Use in Java Programs (MT), pp. 230–233.
IWPCIWPC-2002-BurdOW #animation #comprehension #diagrams #sequence chart #using
Evaluating Using Animation to Improve Understanding of Sequence Diagrams (EB, DO, AW), pp. 107–113.
IWPCIWPC-2002-DeursenV #combinator #comprehension #tool support #using #visitor
Building Program Understanding Tools Using Visitor Combinators (AvD, JV), pp. 137–146.
IWPCIWPC-2002-El-RamlySS #case study #interactive #mining #modelling
Mining System-User Interaction Traces for Use Case Models (MER, ES, PGS), pp. 21–29.
IWPCIWPC-2002-Moonen #impact analysis #lightweight #semiparsing #using
Lightweight Impact Analysis using Island Grammars (LM), pp. 219–228.
IWPCIWPC-2002-SimHE #benchmark #c++ #metric #on the #using
On Using a Benchmark to Evaluate C++ Extractors (SES, RCH, SME), pp. 114–123.
IWPCIWPC-2002-TakadaOI #information management #lightweight #slicing #using
Dependence-Cache Slicing: A Program Slicing Method Using Lightweight Dynamic Information (TT, FO, KI), pp. 169–177.
IWPCIWPC-2002-WuHH #graph #using
Using Graph Patterns to Extract Scenarios (JW, AEH, RCH), pp. 239–247.
PASTEPASTE-2002-BowringOH #monitoring #using
Monitoring deployed software using software tomography (JFB, AO, MJH), pp. 2–9.
PASTEPASTE-2002-Naumovich #analysis #data flow #design pattern #implementation #using
Using the observer design pattern for implementation of data flow analyses (GN), pp. 61–68.
SCAMSCAM-2002-Balmas #dependence #documentation #graph #source code #using
Using Dependence Graphs as a Support to Document Programs (FB), pp. 145–154.
SCAMSCAM-2002-BurdB #clone detection #detection #maintenance #tool support
Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
SCAMSCAM-2002-ChangJH #exception #java #static analysis #using #visualisation
Visualization of Exception Propagation for Java Using Static Analysis (BMC, JWJ, SHH), p. 173–?.
SCAMSCAM-2002-Ghosh #concurrent #fault #metric #object-oriented #source code #testing #towards #using
Towards Measurement of Testability of Concurrent Object-Oriented Programs Using Fault Insertion: A Preliminary Investigation (SG), pp. 17–25.
SCAMSCAM-2002-RamseyA #framework #using
A Simple Mathematically Based Framework for Rule Extraction Using Wide Spectrum Language (FVR, JJA), p. 44–?.
WCREWCRE-2002-BarowskiC #dependence #java
Extraction and Use of Class Dependency Information for Java (LAB, JHCI), p. 309–?.
WCREWCRE-2002-BodhuinGT #cobol #design pattern #migration #mvc #using #web
Migrating COBOL Systems to the WEB by Using the MVC Design Pattern (TB, EG, MT), pp. 329–338.
WCREWCRE-2002-DengK #comprehension #concept #using
Using Conceptual Roles of Data for Enhanced Program Comprehension (YD, SCK), pp. 119–127.
WCREWCRE-2002-McArthurMN #representation #source code #using #xml
An Extensible Tool for Source Code Representation Using XML (GM, JM, SKKN), p. 199–?.
WCREWCRE-2002-RamalMA #maintenance
A Disturbing Result on the Knowledge Used during Software Maintenance (MFNR, RdMM, NA), p. 277–?.
WCREWCRE-2002-RillingM #3d #analysis #on the #source code #visual notation
On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
WCREWCRE-2002-RivaY #architecture #documentation #generative #using #xml
Generation of Architectural Documentation Using XML (CR, YY), p. 161–?.
WCREWCRE-2002-TahvildariK #graph #maintenance #using
A Methodology for Developing Transformations Using the Maintainability Soft-Goal Graph (LT, KK), p. 77–?.
PEPMASIA-PEPM-2002-ParkP #data type #using
Using indexed data structures for program specialization (JGP, MSP), pp. 61–69.
PEPMASIA-PEPM-2002-SheardL #analysis #search-based #using
Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
PEPMASIA-PEPM-2002-Voigtlander #parametricity #source code #using
Using circular programs to deforest in accumulating parameters (JV), pp. 126–137.
PEPMPEPM-2002-LiuS #data type #optimisation #recursion #using
Program optimization using indexed and recursive data structures (YAL, SDS), pp. 108–118.
PLDIPLDI-2002-LeinoPZ #using
Using Data Groups to Specify and Check Side Effects (KRML, APH, YZ), pp. 246–257.
SASSAS-2002-AdamsBDLRSW #analysis #data flow #pointer #using
Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
STOCSTOC-2002-HellersteinR #learning #using
Exact learning of DNF formulas using DNF hypotheses (LH, VR), pp. 465–473.
FLOPSFLOPS-2002-Hasegawa #continuation #linear #monad #λ-calculus
Linearly Used Effects: Monadic and CPS Transformations into the Linear λ Calculus (MH), pp. 167–182.
ICALPICALP-2002-BeierSS #data type #energy #geometry #network #using
Energy Optimal Routing in Radio Networks Using Geometric Data Structures (RB, PS, NS), pp. 366–376.
ICALPICALP-2002-HermenegildoPBL #approximate #debugging #semantics #specification #using #validation
Program Debugging and Validation Using Semantic Approximations and Partial Specifications (MVH, GP, FB, PLG), pp. 69–72.
FMFME-2002-BackesJP #bisimulation #composition #encryption #implementation #using
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation (MB, CJ, BP), pp. 310–329.
FMFME-2002-Casset #development #embedded #formal method #java #using #verification
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
FMFME-2002-CatanoH #java #specification #static analysis #using
Formal Specification and Static Checking of Gemplus’ Electronic Purse Using ESC/Java (NC, MH), pp. 272–289.
FMFME-2002-GaravelH #evaluation #functional #on the #performance #using #verification
On Combining Functional Verification and Performance Evaluation Using CADP (HG, HH), pp. 410–429.
FMFME-2002-Pahl #abstraction #analysis #refinement #using
Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
FMFME-2002-Rusu #generative #testing #using #verification
Verification Using Test Generation Techniques (VR), pp. 252–271.
IFMIFM-2002-WinterD #model checking #using
Model Checking Object-Z Using ASM (KW, RD), pp. 165–184.
AFPAFP-2002-ClaessenRCHW02 #functional #lazy evaluation #quickcheck #source code #testing #using
Testing and Tracing Lazy Functional Programs Using QuickCheck and Hat (KC, CR, OC, JH, MW), pp. 59–99.
ICFPICFP-2002-LuthG #monad #using
Composing monads using coproducts (CL, NG), pp. 133–144.
IFLIFL-2002-AchtenAP
When Generic Functions Use Dynamic Values (PA, AA, MJP), pp. 17–33.
IFLIFL-2002-PortilloHLV #automation #cost analysis #using
Cost Analysis Using Automatic Size and Time Inference (ÁJRP, KH, HWL, PBV), pp. 232–248.
ICGTICGT-2002-ReisRASN #execution #graph transformation #process #semantics #using
Using Graph Transformation as the Semantical Model for Software Process Execution in the APSEE Environment (CALR, RQR, MMdA, HS, DJN), pp. 254–269.
CHICHI-2002-JacobIPP #grid #interface #using
A tangible interface for organizing information using a grid (RJKJ, HI, GP, JP), pp. 339–346.
CHICHI-2002-SellenMS #how #information management #web
How knowledge workers use the web (AS, RM, KLS), pp. 227–234.
CSCWCSCW-2002-EdwardsNSSBSWI #ad hoc #collaboration #peer-to-peer #using
Using speakeasy for ad hoc peer-to-peer collaboration (WKE, MWN, JZS, TFS, DB, DKS, HCW, SI), pp. 256–265.
CSCWCSCW-2002-JonesH #coordination #distributed #using
Extreme work teams: using SWAT teams as a model for coordinating distributed robots (HJ, PJH), pp. 372–381.
CSCWCSCW-2002-KrautGF #development #visual notation
The use of visual information in shared visual spaces: informing the development of virtual co-presence (REK, DG, SRF), pp. 31–40.
AdaEuropeAda-2002-Thom #ada #exclamation #integration #modelling #programming language #standard #uml #using
Conformity! A Practical Integration of Standards — A Case for using the Unified Modelling Language (UML) with the Ada Programming Language (FT), pp. 29–36.
AdaEuropeAdaEurope-2002-AlonsoLVP #case study #object-oriented #using
Using Object Orientation in High Integrity Applications: A Case Study (AA, RL, TV, JAdlP), pp. 357–366.
AdaEuropeAdaEurope-2002-BinderL #embedded #execution #java #kernel #reliability #using
Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications (WB, BL), pp. 125–135.
AdaEuropeAdaEurope-2002-GonzalezSMMG #ada #how
How to Use GNAT to Efficiently Preprocess New Ada Sentences (FJMG, FGS, EM, JM, AG), pp. 179–192.
AdaEuropeAdaEurope-2002-OrtizMAIF #ada #development #uml #using
Development of a Control System for Teleoperated Robots Using UML and Ada95 (FJO, ASM, , AI, JMF), pp. 113–124.
AdaEuropeAdaEurope-2002-ParkinsonG #composition #development #using
High-Integrity Systems Development for Integrated Modular Avionics Using VxWorks and GNAT (PP, FG), pp. 163–178.
CAiSECAiSE-2002-AoumeurS #behaviour #diagrams #logic #prototype #uml #using
Integrating and Rapid-Prototyping UML Structural and Behavioural Diagrams Using Rewriting Logic (NA, GS), pp. 296–310.
CAiSECAiSE-2002-BerlinM #database #feature model #machine learning #using
Database Schema Matching Using Machine Learning with Feature Selection (JB, AM), pp. 452–466.
CAiSECAiSE-2002-CaiY #approach #performance #requirements #using
Addressing Performance Requirements Using a Goal and Scenario-Oriented Approach (ZC, ESKY), pp. 706–710.
CAiSECAiSE-2002-FilhaSLE #query #representation #using #web
Using Nested Tables for Representing and Querying Semistructured Web Data (IMREF, ASdS, AHFL, DWE), pp. 719–723.
CAiSECAiSE-2002-IvanDP #approach #complexity #design #middleware #protocol #using
Managing Complexity of Designing Routing Protocols Using a Middleware Approach (CI, VD, KP), pp. 737–741.
CAiSECAiSE-2002-LeonardiL #requirements #using
Using Business Rules in EXtreme Requirements (MCL, JCSdPL), pp. 420–435.
EDOCEDOC-2002-MosM #approach #architecture #component #modelling #performance #using
Performance Management in Component-Oriented Systems Using a Model Driven ArchitectureTM Approach (AM, JM), pp. 227–237.
ICEISICEIS-2002-Al-TahatISY #approach #development #framework #multi #using #web
Using Hot-Spot-Driven Approach in the Development of a Framework for Multimedia Presentation on the Web (KSAT, SBI, TMTS, MY), pp. 855–860.
ICEISICEIS-2002-BarjisC #analysis #database #design #modelling #semantics #using
Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
ICEISICEIS-2002-DascaluGF #automaton #modelling #using
Using Cellular Automata in Traffic Modeling (MD, SG, EF), pp. 467–472.
ICEISICEIS-2002-Dedene #design #on the #programming
On the Use of Jackson Structured Programming (JSP) for the Structured Design of XSL Transformations (GD), pp. 743–751.
ICEISICEIS-2002-GarveyJR #java #persistent #using
Using Persistent Java to Construct a GIS (MG, MJ, MR), pp. 257–262.
ICEISICEIS-2002-GharibMT #algorithm #clustering #using
High Dimensional Data Clustering Using SOFM And K-Means Algorithms (TFG, MGM, MFT), pp. 488–493.
ICEISICEIS-2002-HillbrandK #approach #metamodelling #network #using
Using Artificial Neural Networks to Prove Hypothetic Cause-And-Effect Relations: A Metamodel-Based Approach to Support Strategic Decisions (CH, DK), pp. 367–373.
ICEISICEIS-2002-KieltykaK #energy #network #predict
The Application of Artificial Neural Networks for Heat Energy Use Prediction (LK, RK), pp. 526–529.
ICEISICEIS-2002-KimT #communication #design #enterprise #modelling #ontology #process #using
Designing Business Processes and Communication Structures for E-Business Using Ontology-Based Enterprise Models with Mathematical Models (HMK, KDT), pp. 635–641.
ICEISICEIS-2002-LaraV #using
Using AToM3 as a Meta-Case Tool (JdL, HV), pp. 642–649.
ICEISICEIS-2002-LarreTMT #integration #using
Data Integration Using the MONIL Language (ML, JTJ, EFM, ST), pp. 115–120.
ICEISICEIS-2002-Lopez #using
Strategic Position of Firms in Terms of Client’s Needs Using Linguistic and Numerical Information through a New Model of SOFM (RFL), pp. 382–390.
ICEISICEIS-2002-Mahmoud #enterprise #java #using
Developing Enterprise Applications Using Java (QHM), p. 21.
ICEISICEIS-2002-MahmoudV #internet #using
Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices (QHM, LV), pp. 1048–1053.
ICEISICEIS-2002-PequenoV #self #using
Using Full Match Classes for Self-Maintenance of Mediated Views (VMP, VMPV), pp. 148–154.
ICEISICEIS-2002-SalimifardW #analysis #modelling #performance #petri net #using #workflow
Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
ICEISICEIS-2002-SalterL #analysis #semantics #using
Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
ICEISICEIS-2002-SanchezSVACD #data mining #mining #using
Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
ICEISICEIS-2002-SantosNASR #classification #data mining #database #learning #mining #using
Augmented Data Mining over Clinical Databases Using Learning Classifier Systems (MFS, JN, AA, ÁMS, FR), pp. 512–516.
ICEISICEIS-2002-Veryha #classification #database #fuzzy #implementation #query #relational #using
Implementation of Fuzzy Classification Query Language in Relational Databases Using Stored Procedures (YV), pp. 195–202.
ICEISICEIS-2002-YooM #multi #scheduling #using
Using Multi-Agent System for Dynamic Job Shop Scheduling (MJY, JPM), pp. 517–525.
CIKMCIKM-2002-Blake #concept #data transformation #distributed #using
Using specification-driven concepts for distributed data management and dissemination (MBB), pp. 629–631.
CIKMCIKM-2002-ChakrabartiF #automation #named #scalability #using
F4: large-scale automated forecasting using fractals (DC, CF), pp. 2–9.
CIKMCIKM-2002-CooperCB #detection #documentation #using
Detecting similar documents using salient terms (JWC, AC, EWB), pp. 245–251.
CIKMCIKM-2002-DeshpandeK #classification #using
Using conjunction of attribute values for classification (MD, GK), pp. 356–364.
CIKMCIKM-2002-LeeMCC #constraints #relational #semantics #using #xml
NeT & CoT: translating relational schemas to XML schemas using semantic constraints (DL, MM, FC, WWC), pp. 282–291.
CIKMCIKM-2002-LiPHL #internet #using
Using micro information units for internet search (XL, THP, MH, BL), pp. 566–573.
CIKMCIKM-2002-NallapatiA #dependence #modelling #using
Capturing term dependencies using a language model based on sentence trees (RN, JA), pp. 383–390.
CIKMCIKM-2002-SistlaHC #automaton #database #query #retrieval #sequence #similarity #using
Similarity based retrieval from sequence databases using automata as queries (APS, TH, VC), pp. 237–244.
CIKMCIKM-2002-WuY #adaptation #monitoring #multi #performance #query #using
Efficient query monitoring using adaptive multiple key hashing (KLW, PSY), pp. 477–484.
CIKMCIKM-2002-Zemankova #information management #question #research
Knowledge and information management: Is it possible to do interesting and important research, get funded, be useful and appreciated? (MZ), pp. 373–374.
ECIRECIR-2002-BenammarHM #analysis #automation #documentation #using
Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
ECIRECIR-2002-BoughanemT #case study #documentation #optimisation #query #retrieval #search-based #using
A Study on Using Genetic Niching for Query Optimisation in Document Retrieval (MB, LT), pp. 135–149.
ECIRECIR-2002-KongoviGD #categorisation #empirical #using
Text Categorization: An Experiment Using Phrases (MK, JCG, VD), pp. 213–228.
ECIRECIR-2002-RajapakseD #adaptation #concept #encoding #information retrieval #representation #using
Concept Based Adaptive IR Model Using FCA-BAM Combination for Concept Representation and Encoding (RKR, MJD), pp. 150–168.
ECIRECIR-2002-TsikrikaL #documentation #network #using #web
Combining Web Document Representations in a Bayesian Inference Network Model Using Link and Content-Based Evidence (TT, ML), pp. 53–72.
ECIRECIR-2002-WhiteRJ #feedback #retrieval #web
The Use of Implicit Evidence for Relevance Feedback in Web Retrieval (RW, IR, JMJ), pp. 93–109.
ICMLICML-2002-FerriFH #learning #using
Learning Decision Trees Using the Area Under the ROC Curve (CF, PAF, JHO), pp. 139–146.
ICMLICML-2002-KamvarKM #algorithm #approach #clustering #modelling #using
Interpreting and Extending Classical Agglomerative Clustering Algorithms using a Model-Based approach (SDK, DK, CDM), pp. 283–290.
ICMLICML-2002-LebanonL #modelling #named #permutation #probability #ranking #using
Cranking: Combining Rankings Using Conditional Probability Models on Permutations (GL, JDL), pp. 363–370.
ICMLICML-2002-Mladenic #learning #normalisation #using #word
Learning word normalization using word suffix and context from unlabeled data (DM), pp. 427–434.
ICMLICML-2002-OLZ #learning #using
Stock Trading System Using Reinforcement Learning with Cooperative Agents (JO, JWL, BTZ), pp. 451–458.
ICMLICML-2002-PickettB #algorithm #learning #named
PolicyBlocks: An Algorithm for Creating Useful Macro-Actions in Reinforcement Learning (MP, AGB), pp. 506–513.
ICMLICML-2002-RaskuttiFK #classification #clustering #parametricity #using
Using Unlabelled Data for Text Classification through Addition of Cluster Parameters (BR, HLF, AK), pp. 514–521.
ICMLICML-2002-Ryan #automation #behaviour #learning #modelling #using
Using Abstract Models of Behaviours to Automatically Generate Reinforcement Learning Hierarchies (MRKR), pp. 522–529.
ICMLICML-2002-SchapireSMLC #estimation #modelling #nondeterminism #using
Modeling Auction Price Uncertainty Using Boosting-based Conditional Density Estimation (RES, PS, DAM, MLL, JAC), pp. 546–553.
ICMLICML-2002-ShapiroL #learning #using
Separating Skills from Preference: Using Learning to Program by Reward (DGS, PL), pp. 570–577.
ICMLICML-2002-StrensBE #markov #monte carlo #optimisation #using
Markov Chain Monte Carlo Sampling using Direct Search Optimization (MJAS, MB, NE), pp. 602–609.
ICMLICML-2002-ThamDR #classification #learning #markov #monte carlo #using
Sparse Bayesian Learning for Regression and Classification using Markov Chain Monte Carlo (SST, AD, KR), pp. 634–641.
ICMLICML-2002-Ting #classification #evaluation #using
Issues in Classifier Evaluation using Optimal Cost Curves (KMT), pp. 642–649.
ICMLICML-2002-ZhangGYF #image #learning #multi #retrieval #using
Content-Based Image Retrieval Using Multiple-Instance Learning (QZ, SAG, WY, JEF), pp. 682–689.
ICPRICPR-v1-2002-BasuPCB #distributed #image #monitoring #retrieval #using
Distributed Retrieval of Wavelet Images Using Bandwidth Monitoring (AB, MHP, LIC, MB), pp. 604–607.
ICPRICPR-v1-2002-BorgeforsS #2d #distance #fuzzy
Fuzzy Border Distance Transforms and Their Use in 2D Skeletonization (GB, SS), pp. 180–183.
ICPRICPR-v1-2002-ChazalRH #automation #detection #metric #using #variability
Automatic Sleep Apnoea Detection Using Measures of Amplitude and Heart Rate Variability from the Electrocardiogram (PdC, RBR, CH), pp. 775–778.
ICPRICPR-v1-2002-DuchesneBBC #classification #image #on the #using
On the Classification of Temporal Lobe Epilepsy Using MR Image Appearance (SD, NB, AB, DLC), pp. 520–523.
ICPRICPR-v1-2002-HadidKP #analysis #learning #linear #using
Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
ICPRICPR-v1-2002-HiranoHTOE #3d #image #quantifier #using
Quantification of Shrinkage of Lung Lobe from Chest CT Images Using the 3D Extended Voronoi Division and its Application to the Benign/Malignant Discrimination of Tumor Shadows (YH, JiH, JiT, HO, KE), pp. 751–754.
ICPRICPR-v1-2002-JeongKSS #gesture #linear #recognition #using
Two-Hand Gesture Recognition using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 9–12.
ICPRICPR-v1-2002-KanekoMM #agile #constraints #correlation #difference #image #using
Using Constraint Inequality on Estimated Correlation for Rapid Image Search (SK, TM, AM), pp. 87–90.
ICPRICPR-v1-2002-KangKB #multi #people #realtime #using
Real-Time Multiple People Tracking Using Competitive Condensation (HK, DK, SYB), pp. 413–416.
ICPRICPR-v1-2002-KoB #image #retrieval #using
Integrated Region-Based Image Retrieval Using Region??s Spatial Relationships (BK, HB), pp. 196–199.
ICPRICPR-v1-2002-KuleshPS #recognition #using #video
Video Clip Recognition Using Joint Audio-Visual Processing Model (VK, VAP, IKS), pp. 500–503.
ICPRICPR-v1-2002-LamarreC #modelling #using
Background Subtraction Using Competing Models in the Block-DCT Domain (ML, JJC), pp. 299–302.
ICPRICPR-v1-2002-LiuCR #adaptation #estimation #parametricity #using
Accurate Dense Optical Flow Estimation Using Adaptive Structure Tensors and a Parametric Model (HL, RC, AR), pp. 291–294.
ICPRICPR-v1-2002-LohRW #3d #modelling #process #using
Refining 3D Models Using a Two-Stage Neural Network-Based Iterative Process (AWKL, MR, GAWW), pp. 172–175.
ICPRICPR-v1-2002-MaedaKI #3d #hybrid #modelling #representation #using
Shapes Modeling of 3-D Objects Based on A Hybrid Representation Using Extended B-spline Surface Model (MM, KK, KI), pp. 656–659.
ICPRICPR-v1-2002-MannJE #programming #segmentation #using
Trajectory Segmentation Using Dynamic Programming (RM, ADJ, TFEM), pp. 331–334.
ICPRICPR-v1-2002-MoreauCP #analysis #estimation #using
Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
ICPRICPR-v1-2002-NguyenVWB #behaviour #monitoring #multi #people #using
Hierarchical Monitoring of People’s Behaviors in Complex Environments Using Multiple Cameras (NTN, SV, GAWW, HHB), pp. 13–16.
ICPRICPR-v1-2002-OkataniD #3d #estimation #image #robust #using
Robust Estimation of Camera Translation Between Two Images Using a Camera With a 3D Orientation Sensor (TO, KD), pp. 275–278.
ICPRICPR-v1-2002-OliveiraSBS #algorithm #feature model #multi #recognition #search-based #using
Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Digit Recognition (LESdO, RS, FB, CYS), pp. 568–571.
ICPRICPR-v1-2002-PalenichkaZ #modelling #multi #self #using
Multi-Scale Model-Based Skeletonization of Object Shapes Using Self-Organizing Maps (RMP, MBZ), pp. 143–146.
ICPRICPR-v1-2002-RahmanNI #behaviour #using
Recognizing Human Behavior Using Universal Eigenspace (MMR, KN, SI), pp. 295–298.
ICPRICPR-v1-2002-SebeLCGH #classification #naive bayes #recognition #using
Emotion Recognition Using a Cauchy Naive Bayes Classifier (NS, MSL, IC, AG, TSH), p. 17–?.
ICPRICPR-v1-2002-SongCLC #approach #image #recognition #using
A New Approach for Line Recognition in Large-size Images Using Hough Transform (JS, MC, MRL, SC), pp. 33–36.
ICPRICPR-v1-2002-TakizawaYMTIM #3d #image #markov #modelling #random #recognition #using
Recognition of Lung Nodules from X-ray CT Images Using 3D Markov Random Field Models (HT, SY, TM, YT, TI, MM), pp. 99–102.
ICPRICPR-v1-2002-TuzikovCB #image #optimisation #symmetry #using
Brain Symmetry Plane Computation in MR Images Using Inertia Axes and Optimization (AVT, OC, IB), pp. 516–519.
ICPRICPR-v1-2002-UchidaRS #recognition #using
Using Eigen-Deformations in Handwritten Character Recognition (SU, MAR, HS), pp. 572–575.
ICPRICPR-v1-2002-UnsalanB #development #image #statistics #using
Classifying Land Development in High Resolution Satellite Images Using Straight Line Statistics (, KLB), pp. 127–130.
ICPRICPR-v1-2002-Verges-LlahiTS #estimation #using
Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (JVL, AT, AS), pp. 381–384.
ICPRICPR-v1-2002-WangQ #complexity #recognition #using
Face Recognition Using Optimal Non-Orthogonal Wavelet Basis Evaluated by Information Complexity (XW, HQ), pp. 164–167.
ICPRICPR-v1-2002-WechslerDLC #bound #predict #using
Motion Prediction Using VC-Generalization Bounds (HW, ZD, FL, VC), pp. 151–154.
ICPRICPR-v1-2002-Worthington #consistency #detection #using
Enhanced Canny Edge Detection Using Curvature Consistency (PLW), pp. 596–599.
ICPRICPR-v1-2002-YilmazSS #estimation #using
Estimation of Rigid and Non-Rigid Facial Motion Using Anatomical Face Model (AY, KS, MS), pp. 377–380.
ICPRICPR-v1-2002-ZhangGSS #2d #image #sequence #using
Recovering Elastic Property of Soft Tissues Using 2D Image Sequences With Limited Range Data (YZ, DBG, SS, MCS), pp. 755–758.
ICPRICPR-v2-2002-AlhichriK #image #using
Image Registration Using Virtual Circles and Edge Direction (HSA, MK), pp. 969–972.
ICPRICPR-v2-2002-Amin #learning #prototype #using
Prototyping Structural Description Using Decision Tree Learning Techniques (AA), pp. 76–79.
ICPRICPR-v2-2002-AuLD #segmentation #using #video
Object Segmentation and Tracking Using Video Locales (JA, ZNL, MSD), pp. 544–547.
ICPRICPR-v2-2002-BarataP #classification #clustering #modelling #set #using
Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 328–331.
ICPRICPR-v2-2002-BauerK #recognition #self #using
Video-Based Sign Recognition Using Self-Organizing Subunits (BB, KFK), pp. 434–437.
ICPRICPR-v2-2002-BhagavathyNM #image #modelling #using
Modeling Object Classes in Aerial Images Using Texture Motifs (SB, SN, BSM), pp. 981–984.
ICPRICPR-v2-2002-CarcassoniH #multi #scalability #using
Point-Set Alignment Using Multidimensional Scaling (MC, ERH), pp. 402–405.
ICPRICPR-v2-2002-CesarBB #graph #optimisation #probability #recognition #using
Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition (RMC, EB, IB), pp. 465–468.
ICPRICPR-v2-2002-ChangCH #recognition #using
Hand Pose Recognition Using Curvature Scale Space (CCC, IYC, YSH), pp. 386–389.
ICPRICPR-v2-2002-ErcilB #classification #polynomial #using
One Class Classification Using Implicit Polynomial Surface Fitting (AE, BB), pp. 152–155.
ICPRICPR-v2-2002-Fasel #analysis #network #robust #using
Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
ICPRICPR-v2-2002-FookesBL #image #using
Improved Stereo Image Matching Using Mutual Information and Hierarchical Prior Probabilities (CF, MB, AL), pp. 937–940.
ICPRICPR-v2-2002-FrantiX #classification #using
Classification of Binary Vectors by Using ??SC-Distance (PF, MX), pp. 52–55.
ICPRICPR-v2-2002-GibsonCT #abstraction #modelling #using #visual notation
Visual Abstraction of Wildlife Footage Using Gaussian Mixture Models and the Minimum Description Length Criterion (DPG, NWC, BTT), pp. 814–817.
ICPRICPR-v2-2002-GuillametV #matrix #metric #using
Determining a Suitable Metric when Using Non-Negative Matrix Factorization (DG, JV), pp. 128–131.
ICPRICPR-v2-2002-Han #classification #using
A Supervised Classification Scheme Using Positive Boolean Function (CCH), pp. 100–103.
ICPRICPR-v2-2002-HoneaSB #using
Active Contours Using a Potential Field (DMH, WES, GLB), pp. 757–760.
ICPRICPR-v2-2002-HsiehT #adaptation #fuzzy #image #using
Wavelet-based Image Coding Using Fuzzy Inference and Adaptive Quantization (MSH, DCT), pp. 265–268.
ICPRICPR-v2-2002-HuangSK #detection #network #using
Face Detection Using a Modified Radial Basis Function Neural Network (LLH, AS, HK), pp. 342–345.
ICPRICPR-v2-2002-HungYL #classification #image
Use of Characteristic Views in Image Classification (CCH, SY, CML), pp. 949–952.
ICPRICPR-v2-2002-Keren #identification #naive bayes #using
Painter Identification Using Local Features and Naive Bayes (DK), pp. 474–477.
ICPRICPR-v2-2002-KimKB #recognition #using
Face Recognition Using LDA Mixture Model (HCK, DK, SYB), pp. 486–489.
ICPRICPR-v2-2002-KimPJKB #classification #using
Pattern Classification Using Support Vector Machine Ensemble (HCK, SP, HMJ, DK, SYB), pp. 160–163.
ICPRICPR-v2-2002-KoskelaLO #image #retrieval #self #using
Using MPEG-7 Descriptors in Image Retrieval with Self-Organizing Maps (MK, JL, EO), pp. 1049–1052.
ICPRICPR-v2-2002-Lu #robust #using
Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering (CSL), pp. 1001–1004.
ICPRICPR-v2-2002-LudtkeLHW #detection #using
Corner Detection Using a Mixture Model of Edge Orientation (NL, BL, ERH, RCW), pp. 574–577.
ICPRICPR-v2-2002-MahmoudiD #3d #modelling #retrieval #using
3D Models Retrieval by Using Characteristic Views (SM, MD), pp. 457–460.
ICPRICPR-v2-2002-MarcelB #using #verification
Improving Face Verification Using Skin Color Information (SM, SB), pp. 378–381.
ICPRICPR-v2-2002-MaWT #recognition #symmetry #using
Iris Recognition Using Circular Symmetric Filters (LM, YW, TT), pp. 414–417.
ICPRICPR-v2-2002-Miyamori #behaviour #identification #retrieval #using #video
Improving Accuracy in Behaviour Identification for Content-Based Retrieval by Using Audio and Video Information (HM), pp. 826–830.
ICPRICPR-v2-2002-MullerWHR #3d #markov #modelling #pseudo #recognition #using
Facial Expression Recognition Using Pseudo 3-D Hidden Markov Models (SM, FW, FH, GR), pp. 32–35.
ICPRICPR-v2-2002-NadimiB #approach #detection #using
Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
ICPRICPR-v2-2002-NelsonG #recognition #using
Tracking Objects Using Recognition (RCN, IAG), pp. 1025–1030.
ICPRICPR-v2-2002-Paletta #classification #detection #using
Detection of Traffic Signs Using Posterior Classifier Combination (LP), pp. 705–708.
ICPRICPR-v2-2002-PolatYS #multi #using
Multiple Complex Object Tracking Using A Combined Technique (EP, MY, RS), pp. 717–720.
ICPRICPR-v2-2002-QunTHC #algorithm #automation #clustering #identification #using
Automatic Fingerprint Identification Using Cluster Algorithm (QR, JT, YH, JC), pp. 398–401.
ICPRICPR-v2-2002-RiviereMMTPF #graph #learning #markov #random #relational #using
Relational Graph Labelling Using Learning Techniques and Markov Random Fields (DR, JFM, JMM, FT, DPO, VF), pp. 172–175.
ICPRICPR-v2-2002-RonnebergerBS #3d #classification #invariant #recognition #set #using
General-Purpose Object Recognition in 3D Volume Data Sets Using Gray-Scale Invariants --- Classification of Airborne Pollen-Grains Recorded with a Confocal Laser Scanning Microscope (OR, HB, ES), p. 290–?.
ICPRICPR-v2-2002-SerratosaSA #3d #graph #modelling #multi #using
Modelling and Recognising 3D-Objects Described by Multiple Views Using Function-Described Graphs (FS, AS, RA), pp. 140–143.
ICPRICPR-v2-2002-SinghG #pattern matching #pattern recognition #recognition #slicing #using
Pattern Recognition Using Information Slicing Method (pRISM) (SS, AG), pp. 144–147.
ICPRICPR-v2-2002-StevensSA #automation #detection #using
Automatic Target Detection Using PMMW and LADAR Imagery (MRS, MS, SA), pp. 647–650.
ICPRICPR-v2-2002-SumengenMK #evolution #image #segmentation #using
Image Segmentation Using Curve Evolution and Region Stability (BS, BSM, CSK), pp. 965–968.
ICPRICPR-v2-2002-SvenssonNAB #distance #image #representation #using
Using Grey-Level and Distance Information for Medial Surface Representation of Volume Images (SS, IN, CA, GSdB), pp. 324–327.
ICPRICPR-v2-2002-TaxD #classification #multi #using
Using Two-Class Classifiers for Multiclass Classification (DMJT, RPWD), pp. 124–127.
ICPRICPR-v2-2002-UdeA #detection #probability #using
Probabilistic Detection and Tracking at High Frame Rates Using Affine Warping (AU, CGA), pp. 6–9.
ICPRICPR-v2-2002-UtsumiT #adaptation #statistics #using
Texture Adaptation for Human Tracking Using Statistical Shape Model (AU, NT), pp. 973–976.
ICPRICPR-v2-2002-WechslerDL #learning #process #using
Hierarchical Interpretation of Human Activities Using Competitive Learning (HW, ZD, FL), pp. 338–341.
ICPRICPR-v2-2002-XuMZY #recognition #using
Motion Based Event Recognition Using HMM (GX, YFM, HZ, SY), pp. 831–834.
ICPRICPR-v2-2002-YangDWZ #estimation #mobile #realtime #using
Real-Time Pose Estimation for Outdoor Mobile Robots Using Range Data (MY, BD, HW, BZ), pp. 593–596.
ICPRICPR-v2-2002-YeL #image #markov #modelling #segmentation #using
Wavelet-Based Unsupervised SAR Image Segmentation Using Hidden Markov Tree Models (ZY, CCL), pp. 729–732.
ICPRICPR-v2-2002-YuB #image #segmentation #using
Image Segmentation Using Gradient Vector Diffusion and Region Merging (ZY, CLB), pp. 941–944.
ICPRICPR-v2-2002-ZhangBS #2d #feature model #recognition #using
Recognition of Similar Objects Using 2-D Wavelet-Fractal Feature Extraction (PZ, TDB, CYS), pp. 316–319.
ICPRICPR-v2-2002-ZhangGST #parametricity #physics #using
Tracking Objects Using Recovered Physical Motion Parameters (YZ, DBG, SS, LVT), pp. 10–13.
ICPRICPR-v3-2002-Al-MaadeedHE #approach #markov #recognition #using #word
Recognition of Off-Line Handwritten Arabic Words Using Hidden Markov Model Approach (SAM, CH, DE), pp. 481–484.
ICPRICPR-v3-2002-BadawyK #graph #representation #using
Shape Representation Using Concavity Graphs (OEB, MK), pp. 461–464.
ICPRICPR-v3-2002-BaesensECV #classification #learning #markov #monte carlo #network #using
Learning Bayesian Network Classifiers for Credit Scoring Using Markov Chain Monte Carlo Search (BB, MEP, RC, JV), pp. 49–52.
ICPRICPR-v3-2002-BoomgaardW #analysis #equivalence #estimation #on the #robust
On the Equivalence of Local-Mode Finding, Robust Estimation and Mean-Shift Analysis as Used in Early Vision Tasks (RvdB, JvdW), pp. 927–930.
ICPRICPR-v3-2002-CampbellF #recognition #using
Recognition of Free-Form Objects in Dense Range Data Using Local Features (RJC, PJF), pp. 607–610.
ICPRICPR-v3-2002-CaputoBN #markov #random #recognition #robust #using
Robust Appearance-Based Object Recognition Using a Fully Connected Markov Random Field (BC, SB, HN), pp. 565–568.
ICPRICPR-v3-2002-ChenKK #approach #using
Albedo Recovery Using a Photometric Stereo Approach (CYC, RK, RK), pp. 700–703.
ICPRICPR-v3-2002-DuricWY #adaptation #gesture #interface #using
Adaptive and Smart Interface for VCR Remote Control Using Hand Gestures (ZD, HW, JY), pp. 1035–1038.
ICPRICPR-v3-2002-FengDW #markov #modelling #recognition #using
Chinese Handwriting Recognition Using Hidden Markov Models (BF, XD, YW), pp. 212–215.
ICPRICPR-v3-2002-FolkersS #database #fourier #image #retrieval #using
Content-Based Image Retrieval Using Fourier Descriptors on a Logo Database (AF, HS), pp. 521–524.
ICPRICPR-v3-2002-ForsterLR #realtime #using
Real-Time Range Imaging for Dynamic Scenes Using Colour-Edge Based Structured Light (FF, MKL, BR), pp. 645–648.
ICPRICPR-v3-2002-HatanoASMOOK #algorithm #difference #using #verification
A Fingerprint Verification Algorithm Using the Differential Matching Rate (TH, TA, SS, HM, SO, YO, HK), pp. 799–802.
ICPRICPR-v3-2002-JeongKSS02a #gesture #linear #recognition #using
Two-Hand Gesture Recognition Using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 529–532.
ICPRICPR-v3-2002-KawaiT #3d #interface #using #visual notation
A Support System for Visually Impaired Persons to Understand Three-dimensional Visual Information Using Acoustic Interface (YK, FT), pp. 974–977.
ICPRICPR-v3-2002-KimCK #automation #clustering #using
Automatic Text Location Using Cluster-Based Template Matching (EYK, JSC, HJK), pp. 423–426.
ICPRICPR-v3-2002-KimKKK #bound #sequence
Usefulness of Boundary Sequences in Computing Shape Features for Arbitrary Shaped Regions (SK, SK, JK, MK), pp. 355–358.
ICPRICPR-v3-2002-KitasakaMHT #3d #automation #image #modelling #using
A Method for Automated Extraction of Aorta and Pulmonary Artery in the Mediastinum Using Medial Line Models from 3D Chest X-ray CT Images without Contrast Materials (TK, KM, JiH, JiT), p. 273–?.
ICPRICPR-v3-2002-Kwon #classification #clustering #using
Hangul Tree Classifier for Type Clustering Using Horizontal and Vertical Strokes (YBK), pp. 228–231.
ICPRICPR-v3-2002-LeeCK #algorithm #robust #using
A Robust Fingerprint Matching Algorithm Using Local Alignment (DL, KC, JK), pp. 803–806.
ICPRICPR-v3-2002-LeungKCT #documentation #fuzzy #image #normalisation #using
Normalization of Contrast in Document Images Using Generalized Fuzzy Operator with Least Square Method (CCL, PCKK, FHYC, WKT), pp. 115–118.
ICPRICPR-v3-2002-MaalmiEBVDG #detection #fault #locality #using
Crack Defect Detection and Localization Using Genetic-Based Inverse Voting Hough Transform (KM, AEO, RB, LFCLYV, AD, PG), pp. 257–260.
ICPRICPR-v3-2002-MacriniSDSZ #3d #graph #recognition #using
View-Based 3-D Object Recognition using Shock Graphs (DM, AS, SJD, KS, SWZ), p. 24–?.
ICPRICPR-v3-2002-ManabePJC #3d #metric #using
Three Dimensional Measurement using Color Structured Patterns and Imaging Spectrograph (YM, JP, TJ, KC), pp. 649–652.
ICPRICPR-v3-2002-MekadaT #distance #using
Anchor Point Thinning Using a Skeleton Based on the Euclidean Distance Transformation (YM, JiT), pp. 923–926.
ICPRICPR-v3-2002-MolinaMKV #image #modelling #multi #using
A General Multichannel Image Restoration Method Using Compound Models (RM, JM, AKK, MV), pp. 835–838.
ICPRICPR-v3-2002-MordohaiM #multi #using
Perceptual Grouping for Multiple View Stereo Using Tensor Voting (PM, GGM), pp. 639–644.
ICPRICPR-v3-2002-SatoKYT #3d #image #modelling #multi #sequence #using
3-D Modeling of an Outdoor Scene by Multi-Baseline Stereo Using a Long Sequence of Images (TS, MK, NY, HT), pp. 581–584.
ICPRICPR-v3-2002-SinKC #image #using
Locating Characters in Scene Images Using Frequency Features (BKS, SKK, BJC), pp. 489–492.
ICPRICPR-v3-2002-StevensSP #identification #using
Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
ICPRICPR-v3-2002-SunPKA #3d #mobile #re-engineering #using
3D Reconstruction of Indoor and Outdoor Scenes Using a Mobile Range Scanner (YS, JKP, AK, MAA), pp. 653–656.
ICPRICPR-v3-2002-TabboneW #2d #recognition #using
Technical Symbols Recognition Using the Two-Dimensional Radon Transform (ST, LW), pp. 200–203.
ICPRICPR-v3-2002-VinciarelliB #markov #modelling #recognition #using #word
Offline Cursive Word Recognition using Continuous Density Hidden Markov Models Trained with PCA or ICA Features (AV, SB), pp. 81–84.
ICPRICPR-v3-2002-WadaKS #approach #generative #using
An Evolutionary Approach for the Generation of Diversiform Characters Using a Handwriting Model (YW, HK, KS), pp. 131–134.
ICPRICPR-v3-2002-WolfD #markov #quality #random #using
Binarization of Low Quality Text Using a Markov Random Field Model (CW, DSD), pp. 160–163.
ICPRICPR-v3-2002-WongLC #multi #network #recognition #using
Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions (KWW, CSL, SJC), pp. 106–109.
ICPRICPR-v3-2002-XuWFS #adaptation #using
Stereo Computation Using Radial Adaptive Windows (YX, DW, TF, HS), pp. 595–598.
ICPRICPR-v3-2002-ZhouK #representation #set #using
Representing and Recognizing Complete Set of Geons Using Extended Superquadrics (LZ, CK), pp. 713–718.
ICPRICPR-v3-2002-ZotkinDDMR #parametricity #using #visual notation
Virtual Audio System Customization Using Visual Matching of Ear Parameters (DNZ, RD, LSD, AM, VCR), pp. 1003–1006.
ICPRICPR-v4-2002-BarataP02a #classification #clustering #modelling #set #using
Improving Classification Rates by Modelling the Clusters of Trainings Sets in Features Space Using Mathematical Morphology Operators (TB, PP), pp. 90–93.
ICPRICPR-v4-2002-BenAbdelkaderCD #automation #estimation #identification #using
Person Identification Using Automatic Height and Stride Estimation (CB, RC, LSD), pp. 377–380.
ICPRICPR-v4-2002-CinqueRLLT #image #query #retrieval #using
Image Retrieval Using Resegmentation Driven by Query Rectangles (LC, FDR, FL, SL, SLT), pp. 142–145.
ICPRICPR-v4-2002-DassJL #detection #markov #modelling #random #synthesis #using
Face Detection and Synthesis Using Markov Random Field Models (SCD, AKJ, XL), pp. 201–204.
ICPRICPR-v4-2002-DuricLSW #detection #image #using
Using Normal Flow for Detection and Tracking of Limbs in Color Images (ZD, FL, YS, HW), p. 268–?.
ICPRICPR-v4-2002-FialaB #re-engineering #using
Panoramic Stereo Reconstruction Using Non-SVP Optics (MF, AB), p. 27–?.
ICPRICPR-v4-2002-FrancoisMW #geometry #symmetry #using
Reconstructing Mirror Symmetric Scenes From a Single View Using 2-View Stereo Geometry (ARJF, GGM, RW), pp. 12–16.
ICPRICPR-v4-2002-FredJ #clustering #using
Data Clustering Using Evidence Accumulation (ALNF, AKJ), pp. 276–280.
ICPRICPR-v4-2002-HadidPM #detection #using
Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering (AH, MP, BM), pp. 196–200.
ICPRICPR-v4-2002-HoogsCK #3d #classification #metaprogramming #using
Classification of 3D Macro Texture Using Perceptual Observables (AH, RC, RK), pp. 113–117.
ICPRICPR-v4-2002-HuangT02a #array #multi #recognition #streaming #using #video
Streaming Face Recognition Using Multicamera Video Arrays (KSH, MMT), pp. 213–216.
ICPRICPR-v4-2002-HuY #algorithm #estimation #robust #search-based #using
Robust Estimation of Trifocal Tensor Using Messy Genetic Algorithm (MH, BY), pp. 347–350.
ICPRICPR-v4-2002-Ichimura #estimation #image #monte carlo #probability #sequence #using
Stochastic Filtering for Motion Trajectory in Image Sequences Using a Monte Carlo Filter with Estimation of Hyper-Parameters (NI), pp. 68–73.
ICPRICPR-v4-2002-JainXHX #testing #using
Uniformity Testing Using Minimal Spanning Tree (AKJ, XX, TKH, FX), pp. 281–284.
ICPRICPR-v4-2002-JhanwarCSZ #image #retrieval #using
Content Based Image Retrieval Using Optimum Peano Scan (NJ, SC, GS, BZ), pp. 130–133.
ICPRICPR-v4-2002-KangCM #estimation #image #robust #using
Robust Affine Motion Estimation in Joint Image Space Using Tensor Voting (EYEK, IC, GGM), pp. 256–259.
ICPRICPR-v4-2002-LamXS #difference #using
Differentiation between Alphabetic and Numeric Data Using NN Ensembles (LL, QX, CYS), pp. 40–43.
ICPRICPR-v4-2002-MathisB #approach #classification #using
Classification Using a Hierarchical Bayesian Approach (CM, TMB), p. 103–?.
ICPRICPR-v4-2002-MendelsVT #invariant #recognition #representation #using
Rotation and Scale Invariant Shape Representation and Recognition Using Matching Pursuit (FM, PV, JPT), pp. 326–329.
ICPRICPR-v4-2002-MorencyD #constraints #using
Stereo Tracking Using ICP and Normal Flow Constraint (LPM, TD), p. 367–?.
ICPRICPR-v4-2002-PalaciosVK #algorithm #distance #evaluation #using
An Evaluation of the WPE Algorithm Using Tangent Distance (RPP, EV, DK), pp. 48–51.
ICPRICPR-v4-2002-SrinivasanB #estimation #using
Head Pose Estimation Using View Based Eigenspaces (SS, KLB), pp. 302–305.
ICPRICPR-v4-2002-ToyamaFSM #algorithm #assembly #search-based #using
Assembly of Puzzles Using a Genetic Algorithm (FT, YF, KS, JM), pp. 389–392.
ICPRICPR-v4-2002-TraverP #estimation #image #segmentation #using
Motion Estimation and Figure-Ground Segmentation Using Log-Polar Images (VJT, FP), pp. 166–169.
ICPRICPR-v4-2002-XiL #detection #feature model #using
Face Detection and Facial Feature Extraction Using Support Vector Machines (DX, SWL), pp. 209–212.
KDDKDD-2002-AyresFGY #mining #representation #using
Sequential PAttern mining using a bitmap representation (JA, JF, JG, TY), pp. 429–435.
KDDKDD-2002-FangHL #identification #using
Tumor cell identification using features rules (BF, WH, MLL), pp. 495–500.
KDDKDD-2002-GodboleSC #multi #scalability #using
Scaling multi-class support vector machines using inter-class confusion (SG, SS, SC), pp. 513–518.
KDDKDD-2002-Joachims #optimisation #using
Optimizing search engines using clickthrough data (TJ), pp. 133–142.
KDDKDD-2002-RaskuttiFK #classification #clustering #using
Combining clustering and co-training to enhance text classification using unlabelled data (BR, HLF, AK), pp. 620–625.
KDDKDD-2002-RossetNEVI #modelling
Customer lifetime value modeling and its use for customer retention planning (SR, EN, UE, NV, YI), pp. 332–340.
KDDKDD-2002-SarawagiB #interactive #learning #using
Interactive deduplication using active learning (SS, AB), pp. 269–278.
KDDKDD-2002-StolteTH #analysis #query #using #visualisation
Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
KDDKDD-2002-UedaS #category theory #detection #modelling #multi #parametricity #using
Single-shot detection of multiple categories of text using parametric mixture models (NU, KS), pp. 626–631.
KDDKDD-2002-WalterR #interactive #on the #using #visualisation
On interactive visualization of high-dimensional data using the hyperbolic plane (JAW, HJR), pp. 123–132.
KDDKDD-2002-YuHC #classification #learning #named #using #web
PEBL: positive example based learning for Web page classification using SVM (HY, JH, KCCC), pp. 239–248.
SEKESEKE-2002-AndaS #case study #modelling #towards
Towards an inspection technique for use case models (BA, DIKS), pp. 127–134.
SEKESEKE-2002-BriandFL #algorithm #integration #metric #order #search-based #using
Using genetic algorithms and coupling measures to devise optimal integration test orders (LCB, JF, YL), pp. 43–50.
SEKESEKE-2002-BryantBARO #assembly #component #generative #specification #two-level grammar #using
Formal specification of generative component assembly using two-level grammar (BRB, CCB, MA, RRR, AMO), pp. 209–212.
SEKESEKE-2002-CostagliolaDFG #modelling #using #visual notation
Using extended positional grammars to develop visual modeling languages (GC, VD, FF, CG), pp. 201–208.
SEKESEKE-2002-ErikssonBN #documentation #information management #java #using
Using knowledge engineering support for a Java documentation viewer (HE, EB, PN), pp. 57–64.
SEKESEKE-2002-Lozano-TelloG #component #how #named #process #using
BAREMO: how to choose the appropriate software component using the analytic hierarchy process (ALT, AGP), pp. 781–788.
SEKESEKE-2002-Morasca #classification #using
A proposal for using continuous attributes in classification trees (SM), pp. 417–424.
SEKESEKE-2002-RaffoHV #framework #hybrid #metric #modelling #process #trade-off #using
Software process decision support: making process tradeoffs using a hybrid metrics, modeling and utility framework (DR, WH, JV), pp. 803–809.
SEKESEKE-2002-XuVIY #behaviour #modelling #multi #using #verification
Modeling and verifying multi-agent behaviors using predicate/transition nets (DX, RAV, TRI, JY), pp. 193–200.
SIGIRSIGIR-2002-AllanR #ambiguity #query #using
Using part-of-speech patterns to reduce query ambiguity (JA, HR), pp. 307–314.
SIGIRSIGIR-2002-AminiG #learning #summary
The use of unlabeled data to improve supervised learning for text summarization (MRA, PG), pp. 105–112.
SIGIRSIGIR-2002-BennettDH #classification #modelling #probability #reliability #using
Probabilistic combination of text classifiers using reliability indicators: models and results (PNB, STD, EH), pp. 207–214.
SIGIRSIGIR-2002-Boyapati #classification #using
Improving hierarchical text classification using unlabeled data (VB), pp. 363–364.
SIGIRSIGIR-2002-CarmelFPS #automation #information management #query #refinement #using
Automatic query refinement using lexical affinities with maximal information gain (DC, EF, YP, AS), pp. 283–290.
SIGIRSIGIR-2002-FedericoB #information retrieval #query #statistics #using
Statistical cross-language information retrieval using n-best query translations (MF, NB), pp. 167–174.
SIGIRSIGIR-2002-GaoZNHC #ambiguity #dependence #query #using
Resolving query translation ambiguity using a decaying co-occurrence model and syntactic dependence relations (JG, MZ, JYN, HH, WC), pp. 183–190.
SIGIRSIGIR-2002-GravesL #network #retrieval #using #video
Video retrieval using an MPEG-7 based inference network (AG, ML), pp. 339–346.
SIGIRSIGIR-2002-JinSHC #information retrieval #using
Language model for IR using collection information (RJ, LS, AGH, JPC), pp. 419–420.
SIGIRSIGIR-2002-PengHSCR #information retrieval #segmentation #self #using #word
Using self-supervised word segmentation in Chinese information retrieval (FP, XH, DS, NC, SER), pp. 349–350.
SIGIRSIGIR-2002-ShouS #data fusion #using
Experiments on data fusion using headline information (XMS, MS), pp. 413–414.
SIGIRSIGIR-2002-SiC #using
Using sampled data and regression to merge search engine results (LS, JPC), pp. 19–26.
SIGIRSIGIR-2002-SlonimFT #classification #documentation #using
Unsupervised document classification using sequential information maximization (NS, NF, NT), pp. 129–136.
SIGIRSIGIR-2002-TakedaU #adaptation #string #using
Selecting indexing strings using adaptation (YT, KU), pp. 427–428.
SIGIRSIGIR-2002-WhiteJR #documentation #feedback #ranking #using #web
A system using implicit feedback and top ranking sentences to help users find relevant web documents (RW, JMJ, IR), p. 446.
SIGIRSIGIR-2002-WhiteRJ #documentation #evaluation #ranking #using
Finding relevant documents using top ranking sentences: an evaluation of two alternative schemes (RW, IR, JMJ), pp. 57–64.
SIGIRSIGIR-2002-Zha #clustering #summary #using
Generic summarization and keyphrase extraction using mutual reinforcement principle and sentence clustering (HZ), pp. 113–120.
UMLUML-2002-FelfernigFJZ #information management #ocl #representation #uml #using
Configuration Knowledge Representation Using UML/OCL (AF, GF, DJ, MZ), pp. 49–62.
UMLUML-2002-FrohlichHS #industrial #modelling #multi #uml #using
Using UML for Information Modeling in Industrial Systems with Multiple Hierarchies (PF, ZH, MS), pp. 63–72.
UMLUML-2002-GenovaLQ #case study
Digging into Use Case Relationships (GG, JL, VQ), pp. 115–127.
UMLUML-2002-SchattkowskyL #agile #composition #development #uml #using #web
Rapid Development of Modular Dynamic Web Sites Using UML (TS, ML), pp. 336–350.
TOOLSTOOLS-USA-2002-HallstromS #case study #development #framework #incremental #object-oriented #using
Incremental Development Using Object Oriented Frameworks: A Case Study (JOH, NS), pp. 189–205.
TOOLSTOOLS-USA-2002-Nunes #contract #design #using
Design by Contract Using Meta-Assertions (IN), pp. 37–56.
GPCEGPCE-2002-BarbeauB #development #generative #programming #protocol #stack #using
A Protocol Stack Development Tool Using Generative Programming (MB, FB), pp. 93–109.
LOPSTRLOPSTR-2002-AbdennadherR #constraints #logic programming #synthesis #theorem proving #using
Constraint Solver Synthesis Using Tabled Resolution for Constraint Logic Programming (SA, CR), pp. 32–47.
PPDPPPDP-2002-DrapeMS #dot-net #logic programming #using
Transforming the .NET intermediate language using path logic programming (SD, OdM, GS), pp. 133–144.
PPDPPPDP-2002-SomogyiS #stack #using
Using the heap to eliminate stack accesses (ZS, PJS), pp. 121–132.
PADLPADL-2002-Meadows #analysis #declarative #using
Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
RERE-2002-AntonER #privacy #requirements #taxonomy #using
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
RERE-2002-Daneva #enterprise #maturity #process #requirements #using
Using Maturity Assessments to Understand the ERP Requirements Engineering Process (MD), pp. 255–262.
RERE-2002-DulacVLS #on the #requirements #specification #visualisation
On the Use of Visualization in Formal Requirements Specification (ND, TV, NGL, MADS), pp. 71–80.
RERE-2002-DuranCCT #requirements #using #verification
Supporting Requirements Verification Using XSLT (AD, ARC, RC, MT), pp. 165–172.
RERE-2002-FantechiGLM #analysis #case study
Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
RERE-2002-Garcia-DuquePB #requirements #specification #using
An Analysis-Revision Cycle to Evolve Requirements Specifications by Using the SCTL-MUS Methodology (JGD, JJPA, ABBM), pp. 282–288.
RERE-2002-HallJLNR #architecture #problem #requirements #using
Relating Software Requirements and Architectures Using Problem Frames (JGH, MJ, RCL, BN, LR), pp. 137–144.
RERE-2002-SantanderC #case study #modelling
Deriving Use Cases from Organizational Modeling (VFAS, JC), pp. 32–42.
RERE-2002-WooR #approach #automation #lightweight #relational #reuse #specification #using
Reuse of Scenario Specifications Using an Automated Relational Learner: A Lightweight Approach (HGW, WNR), pp. 173–180.
SACSAC-2002-AntoniouA #declarative #execution
Executable declarative business rules and their use in electronic commerce (GA, MA), pp. 6–10.
SACSAC-2002-BillhardtBM #algorithm #retrieval #search-based #using
Using genetic algorithms to find suboptimal retrieval expert combinations (HB, DB, VM), pp. 657–662.
SACSAC-2002-BinderR #java #mobile #question #using
Secure mobile agent systems using Java: where are we heading? (WB, VR), pp. 115–119.
SACSAC-2002-ChanLMLHL #concept #documentation #mobile #multi #navigation #summary #using
Multiple related document summary and navigation using concept hierarchies for mobile clients (DLC, RWPL, WKM, HVL, EKSH, QL), pp. 627–632.
SACSAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #using
A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
SACSAC-2002-DingDP #classification #data type #using
Decision tree classification of spatial data streams using Peano Count Trees (QD, QD, WP), pp. 413–417.
SACSAC-2002-GallardoMMR #abstraction #model checking #using #xml
Using XML to implement abstraction for Model Checking (MdMG, JM, PM, ER), pp. 1021–1025.
SACSAC-2002-GarigipatiN #profiling
Evaluating the use of profiling by a region-based register allocator (KVG, CN), pp. 953–957.
SACSAC-2002-Jurjens02a #development #using
Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
SACSAC-2002-KimL #adaptation #clustering #distance #documentation #effectiveness #metric #using
An effective document clustering method using user-adaptable distance metrics (HjK, SgL), pp. 16–20.
SACSAC-2002-MaciasVR #algorithm #mining #using
Mining interesting regions using an evolutionary algorithm (JLÁM, JMV, JCRS), pp. 498–502.
SACSAC-2002-NascimentoC #image #retrieval #using
Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
SACSAC-2002-NyakoeOT #algorithm #multi #search-based #using
Acquisition of modulation pulses for a multi-robot system using genetic algorithm (GNN, MO, ST), pp. 568–573.
SACSAC-2002-Pillay #algorithm #induction #programming #search-based #using
Using genetic programming for the induction of novice procedural programming solution algorithms (NP), pp. 578–583.
SACSAC-2002-SweeneyCT #mobile #summary #using
Mobile delivery of news using hierarchical query-biased summaries (SOS, FC, AT), pp. 634–639.
SACSAC-2002-WangHTN #ad hoc #network
AODV compatible routing with extensive use of cache information in ad-hoc networks (WGW, TH, MT, SN), pp. 852–859.
SACSAC-2002-YoungBGL #difference #object-oriented #using
Using an object oriented model for resolving representational differences between heterogeneous systems (PY, VB, JG, L), pp. 976–983.
FSEFSE-2002-XieE #fault #using
Using redundancies to find errors (YX, DRE), pp. 51–60.
ICSEICSE-2002-HangalL #automation #debugging #detection #using
Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
ICSEICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
ICSEICSE-2002-LenceviciusMR #using #validation
Software validation using power profiles (RL, EM, AR), p. 709.
ICSEICSE-2002-Michail #source code #using
Browsing and searching source code of applications written using a GUIframework (AM), pp. 327–337.
ICSEICSE-2002-RobillardM #dependence #graph #using
Concern graphs: finding and describing concerns using structural program dependencies (MPR, GCM), pp. 406–416.
ICSEICSE-2002-Wong
Use of software inspection inputs in practice (YKW), pp. 725–726.
LDTALDTA-2002-GondowK #c #slicing #towards #using #xml
Towards ANSI C Program Slicing using XML (KG, HK), pp. 30–49.
SPLCSPLC-2002-DeursenJK #product line #using
Feature-Based Product Line Instantiation Using Source-Level Packages (AvD, MdJ, TK), pp. 217–234.
SPLCSPLC-2002-FeyFB #feature model #metamodelling #modelling #usability
Feature Modeling: A Meta-Model to Enhance Usability and Usefulness (DF, RF, AB), pp. 198–216.
SPLCSPLC-2002-KangDKLL #development #product line #using
Using a Marketing and Product Plan as a Key Driver for Product Line Asset Development (KCK, PD, EK, JL, KL), pp. 366–382.
SPLCSPLC-2002-Mannion #first-order #logic #product line #using #validation
Using First-Order Logic for Product Line Model Validation (MM), pp. 176–187.
SPLCSPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering #using
Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
CCCC-2002-CilioC #using
Global Variable Promotion: Using Registers to Reduce Cache Power Dissipation (AGMC, HC), pp. 247–260.
CCCC-2002-GaravelLM #compilation #using
Compiler Construction Using LOTOS NT (HG, FL, RM), pp. 9–13.
HPCAHPCA-2002-BrownP #pipes and filters #using
Using Internal Redundant Representations and Limited Bypass to Support Pipelined Adders and Register Files (MDB, YNP), pp. 289–298.
HPCAHPCA-2002-GurumurthiSIVKLJ #approach #estimation #simulation #using
Using Complete Machine Simulation for Software Power Estimation: The SoftWatt Approach (SG, AS, MJI, NV, MTK, TL, LKJ), pp. 141–150.
HPCAHPCA-2002-KampeSD #analysis #branch #fourier #predict #using
The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
HPCAHPCA-2002-SemeraroMBADS #design #energy #multi #scalability #using
Energy-Efficient Processor Design Using Multiple Clock Domains with Dynamic Voltage and Frequency Scaling (GS, GM, RB, DHA, SD, MLS), pp. 29–42.
HPDCHPDC-2002-AllenWP #adaptation #network #using
Adaptive Timeout Discovery Using the Network Weather Service (MSA, RW, JSP), pp. 35–41.
HPDCHPDC-2002-HumphreyAW #grid #using
Location-Transparent Naming in Grid Computing Using Legion-G (MH, SA, GSW), p. 418.
HPDCHPDC-2002-Schulz #clustering #parallel #performance #semantics #using
Using Semantic Information to Guide Efficient Parallel I/O on Clusters (MS), pp. 135–142.
HPDCHPDC-2002-SubramaniKSS #distributed #multi #scheduling #using
Distributed Job Scheduling on Computational Grids Using Multiple Simultaneous Requests (VS, RK, SS, PS), p. 359–?.
HPDCHPDC-2002-TaylorWGS #kernel #parallel #performance #predict #using
Using Kernel Couplings to Predict Parallel Application Performance (VET, XW, JG, RLS), pp. 125–134.
ISMMISMM-2002-JohanssonSW #architecture #concurrent #message passing #using
Heap architectures for concurrent languages using message passing (EJ, KFS, JW), pp. 195–206.
ISMMISMM-2002-VardhanA #algorithm #garbage collection #using
Using passive object garbage collection algorithms for garbage collection of active objects (AV, GA), pp. 213–220.
LCTESLCTES-SCOPES-2002-HunlethC #aspect-oriented #programming #using
Footprint and feature management using aspect-oriented programming techniques (FH, RC), pp. 38–45.
LCTESLCTES-SCOPES-2002-MohantyPND #agile #design #embedded #multi #simulation #using
Rapid design space exploration of heterogeneous embedded systems using symbolic search and multi-granular simulation (SM, VKP, SN, JRD), pp. 18–27.
LCTESLCTES-SCOPES-2002-PalmLDM #compilation #question
When to use a compilation service? (JP, HBL, AD, JEBM), pp. 194–203.
OSDIOSDI-2002-ElsonGE #fine-grained #network #using
Fine-Grained Network Time Synchronization Using Reference Broadcasts (JE, LG, DE), pp. 147–163.
OSDIOSDI-2002-KumarL #debugging #model checking #using
Using Model Checking to Debug Device Firmware (SK, KL), pp. 61–74.
OSDIOSDI-2002-QiePP #programming #tool support #using
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
CADECADE-2002-Ahrendt #data type #deduction #fault #generative #specification #using
Deductive Search for Errors in Free Data Type Specifications Using Model Generation (WA), pp. 211–225.
CAVCAV-2002-BryantLS #logic #modelling #using #verification
Modeling and Verifying Systems Using a Logic of Counter Arithmetic with λ Expressions and Uninterpreted Functions (REB, SKL, SAS), pp. 78–92.
CAVCAV-2002-ClarkeGKS #abstraction #machine learning #satisfiability #using
SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques (EMC, AG, JHK, OS), pp. 265–279.
CAVCAV-2002-GodefroidJ #abstraction #automation #model checking #using
Automatic Abstraction Using Generalized Model Checking (PG, RJ), pp. 137–150.
CAVCAV-2002-RybinaV #canonical #infinity #model checking #using
Using Canonical Representations of Solutions to Speed Up Infinite-State Model Checking (TR, AV), pp. 386–400.
CAVCAV-2002-YounesS #probability #using #verification
Probabilistic Verification of Discrete Event Systems Using Acceptance Sampling (HLSY, RGS), pp. 223–235.
ICLPICLP-2002-BockmayrC #biology #concurrent #constraints #hybrid #programming #using
Using Hybrid Concurrent Constraint Programming to Model Dynamic Biological Systems (AB, AC), pp. 85–99.
ICLPICLP-2002-Christensen #detection #logic programming #pervasive #process #using
Using Logic Programming to Detect Activities in Pervasive Healthcare (HBC), pp. 421–436.
ICLPICLP-2002-PemmasaniRR #constraints #logic programming #model checking #performance #realtime #using
Efficient Real-Time Model Checking Using Tabled Logic Programming and Constraints (GP, CRR, IVR), pp. 100–114.
ICLPICLP-2002-VaucheretGM #fuzzy #implementation #prolog #using
Fuzzy Prolog: A Simple General Implementation Using CLP(R) (CV, SG, SMH), p. 469.
ISSTAISSTA-2002-BriandLS #analysis #contract #fault #object-oriented
Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
ISSTAISSTA-2002-GroceV #heuristic #java #model checking #source code #using
Model checking Java programs using structural heuristics (AG, WV), pp. 12–21.
ISSTAISSTA-2002-LiangPH #analysis #precise #profiling #using
Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
SATSAT-2002-HirschK #named #satisfiability
UnitWalk: A new SAT solver that uses local search guided by unit clause elimination (EH, AK), p. 38.
SATSAT-2002-Kullmann #adaptation #branch #database #encryption #normalisation #random #satisfiability #standard #towards #using
Towards an adaptive density based branching rule for SAT solvers, using a database for mixed random conjunctive normal forms built upon the Advanced Encryption Standard (AES) (OK), p. 8.
ICTSSTestCom-2002-SchulzV #implementation #using
Implementation of TTCN-3 Test Systems using the TRI (SS, TVG), pp. 425–442.
VMCAIVMCAI-2002-Huth #model checking #using
Model Checking Modal Transition Systems Using Kripke Structures (MH), pp. 302–316.
CBSECBSE-2001-Wile #architecture #using
Ensuring General-Purpose and Domain-Specific Properties Using Architectural Styles (DSW), p. 6.
ASEASE-2001-GannodG #automation #petri net #using
An Automated Tool for Analyzing Petri Nets Using SPIN (GCG, SG), pp. 404–407.
ASEASE-2001-GrosuLSSY #automation #concurrent #re-engineering #using
Automated Software Engineering Using Concurrent Class Machines (RG, YAL, SAS, SDS, JY), p. 297–?.
ASEASE-2001-HavelundR #monitoring #source code #using
Monitoring Programs Using Rewriting (KH, GR), pp. 135–143.
ASEASE-2001-InverardiMP #architecture #automation #consistency #modelling #using
Automated Check of Architectural Models Consistency Using SPIN (PI, HM, PP), pp. 346–349.
ASEASE-2001-McLarenW #framework #generative #using #xml
Developing Generative Frameworks Using XML (IM, TW), pp. 368–372.
DACDAC-2001-BanerjeeM #analysis #distributed #novel #optimisation #performance #using
Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
DACDAC-2001-BhanjaR #dependence #modelling #network #probability #process #using
Dependency Preserving Probabilistic Modeling of Switching Activity using Bayesian Networks (SB, NR), pp. 209–214.
DACDAC-2001-Bondalapati #architecture #configuration management #using
Parallelizing DSP Nested Loops on Reconfigurable Architectures using Data Context Switching (KB), pp. 273–276.
DACDAC-2001-ChangWM #logic #using
Layout-Driven Hot-Carrier Degradation Minimization Using Logic Restructuring Techniques (CWJC, KW, MMS), pp. 97–102.
DACDAC-2001-ChenBD #embedded #fault #testing #using
Testing for Interconnect Crosstalk Defects Using On-Chip Embedded Processor Cores (LC, XB, SD), pp. 317–320.
DACDAC-2001-Ciriani #logic #using
Logic Minimization using Exclusive OR Gates (VC), pp. 115–120.
DACDAC-2001-DanielSW #analysis #performance #using
Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
DACDAC-2001-Dervisoglu #architecture #data access
A Unified DFT Architecture for Use with IEEE 1149.1 and VSIA/IEEE P1500 Compliant Test Access Controllers (BID), pp. 53–58.
DACDAC-2001-GolumbicMR #recognition #using
Factoring and Recognition of Read-Once Functions using Cographs and Normality (MCG, AM, UR), pp. 109–114.
DACDAC-2001-HalpinCS #constraints #physics #using
Timing Driven Placement using Physical Net Constraints (BH, CYRC, NS), pp. 780–783.
DACDAC-2001-KimJSLK #optimisation #using
Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
DACDAC-2001-MajumdarW #combinator #satisfiability #using
Watermarking of SAT using Combinatorial Isolation Lemmas (RM, JLW), pp. 480–485.
DACDAC-2001-MathurS #analysis #precise #using
Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
DACDAC-2001-McDonaldB #analysis #simulation #using
Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
DACDAC-2001-PeymandoustM #algebra #algorithm #synthesis #using
Using Symbolic Algebra in Algorithmic Level DSP Synthesis (AP, GDM), pp. 277–282.
DACDAC-2001-ShinKL #analysis #energy #scheduling #using
Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
DACDAC-2001-SolomonH #layout #using
Using Texture Mapping with Mipmapping to Render a VLSI Layout (JS, MH), pp. 500–505.
DACDAC-2001-VelevB #effectiveness #satisfiability #verification
Effective Use of Boolean Satisfiability Procedures in the Formal Verification of Superscalar and VLIW Microprocessors (MNV, REB), pp. 226–231.
DACDAC-2001-YalcinPMBSH #dependence #using
An Advanced Timing Characterization Method Using Mode Dependency (HY, RP, MM, CB, KAS, JPH), pp. 657–660.
DACDAC-2001-YuYW #representation #synthesis #using
Signal Representation Guided Synthesis Using Carry-Save Adders For Synchronous Data-path Circuits (ZY, MLY, ANWJ), pp. 456–461.
DATEDATE-2001-Burdiek #generative #programming #using
Generation of optimum test stimuli for nonlinear analog circuits using nonlinear — programming and time-domain sensitivities (BB), pp. 603–609.
DATEDATE-2001-ChandraC #performance #testing #using
Efficient test data compression and decompression for system-on-a-chip using internal scan chains and Golomb coding (AC, KC), pp. 145–149.
DATEDATE-2001-ChangHM #functional #optimisation #symmetry #using
In-place delay constrained power optimization using functional symmetries (CWJC, BH, MMS), pp. 377–382.
DATEDATE-2001-CheungWC #clustering #logic #using
Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
DATEDATE-2001-DorschW #embedded #logic #testing #using
Using mission logic for embedded testing (RD, HJW), p. 805.
DATEDATE-2001-GoldbergPB #equivalence #satisfiability #using
Using SAT for combinational equivalence checking (EIG, MRP, RKB), pp. 114–121.
DATEDATE-2001-HajjarCMAB #behaviour #quality #statistics #using #verification
High quality behavioral verification using statistical stopping criteria (AH, TC, IM, AAA, MB), pp. 411–419.
DATEDATE-2001-HoffmannNPBM #development #generative #quality #tool support #using
Generating production quality software development tools using a machine description language (AH, AN, SP, GB, HM), pp. 674–678.
DATEDATE-2001-HuangM #configuration management #design #network #using
Managing dynamic reconfiguration overhead in systems-on-a-chip design using reconfigurable datapaths and optimized interconnection networks (ZH, SM), p. 735.
DATEDATE-2001-NeauMR #complexity #using
Low complexity FIR filters using factorization of perturbed coefficients (CN, KM, KR), pp. 268–272.
DATEDATE-2001-RedaS #diagrams #equivalence #satisfiability #using
Combinational equivalence checking using Boolean satisfiability and binary decision diagrams (SR, AS), pp. 122–126.
DATEDATE-2001-RonaK #modelling #using
Modelling SoC devices for virtual test using VHDL (MR, GK), pp. 770–771.
DATEDATE-2001-TeicaRV #automation #design #on the #using #verification
On the verification of synthesized designs using automatically generated transformational witnesses (ET, RR, RV), p. 798.
DATEDATE-2001-ThorntonD #diagrams #graph transformation #using
Spectral decision diagrams using graph transformations (MAT, RD), pp. 713–719.
DATEDATE-2001-VanasscheGS #exponential #performance #simulation #using
Efficient time-domain simulation of telecom frontends using a complex damped exponential signal model (PV, GGEG, WMCS), pp. 169–175.
DATEDATE-2001-XuM #difference #modelling #performance #using
Efficient and passive modeling of transmission lines by using differential quadrature method (QX, PM), pp. 437–444.
DocEngDocEng-2001-NaF #analysis #authoring #documentation #hypermedia #petri net #using
Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
DocEngDocEng-2001-VarlamisV #database #documentation #generative #relational #using #xml
Bridging XML-schema and relational databases: a system for generating and manipulating relational databases using valid XML documents (IV, MV), pp. 105–114.
HTHT-2001-AguiarB #information management #retrieval #web
Improvement of Web retrieval by the use of contextual information of pages (FA, MB), pp. 247–248.
HTHT-2001-CrowderSWG #bibliography #hypermedia #using
A review of the benefits of using hypermedia manuals (RC, YWS, GW, RG), pp. 245–246.
HTHT-2001-MooreBS #education #using
Personally tailored teaching in WHURLE using conditional transclusion (AM, TJB, CDS), pp. 163–164.
HTHT-2001-RubartHTW #component #enterprise #hypermedia #using
Organizing shared enterprise workspaces using component-based cooperative hypermedia (JR, JMH, DAT, WW), pp. 73–82.
HTHT-2001-WealMMR #using
Building narrative structures using context based linking (MJW, DEM, DTM, DDR), pp. 37–38.
ICDARICDAR-2001-BagdanovW #classification #documentation #fine-grained #first-order #graph #random #using
Fine-Grained Document Genre Classification Using First Order Random Graphs (ADB, MW), pp. 79–85.
ICDARICDAR-2001-BloombergPM #documentation #heuristic #image #using
Document Image Decoding Using Iterated Complete Path Search with Subsampled Heuristic Scoring (DSB, KP, TPM), pp. 344–349.
ICDARICDAR-2001-BourgeoisEB #comprehension #documentation #probability #using
Document Understanding Using Probabilistic Relaxation: Application on Tables of Contents of Periodicals (FL, HE, SSB), pp. 508–512.
ICDARICDAR-2001-BrakensiekR #comparison #n-gram #recognition
A Comparison of Character N-Grams and Dictionaries Used for Script Recognition (AB, GR), pp. 241–245.
ICDARICDAR-2001-Breuel #algorithm #programming #segmentation #string #using
Segmentation of Handprinted Letter Strings Using a Dynamic Programming Algorithm (TMB), pp. 821–826.
ICDARICDAR-2001-ChoisyB #normalisation #recognition #using
Handwriting Recognition Using Local Methods for Normalization and Global Methods for Recognition (CC, AB), pp. 23–27.
ICDARICDAR-2001-DawoudK #documentation #image #using
Binarization of Document Images Using Image Dependent Model (AD, MK), pp. 49–53.
ICDARICDAR-2001-EtoS #network #recognition #using
Mathematical Formula Recognition Using Virtual Link Network (YE, MS), pp. 762–767.
ICDARICDAR-2001-FanCW #documentation #identification #using
Form Document Identification Using Line Structure Based Features (KCF, MLC, YKW), pp. 704–708.
ICDARICDAR-2001-FanFT #documentation #image #using
Binarizing Document Image Using Coplanar Prefilter (LF, LF, CLT), pp. 34–38.
ICDARICDAR-2001-GarainC #analysis #fuzzy #multi #segmentation #using
Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
ICDARICDAR-2001-GuoM #markov #modelling #using
Separating Handwritten Material from Machine Printed Text Using Hidden Markov Models (JKG, MYM), pp. 439–443.
ICDARICDAR-2001-HadjarHI #approach #composition #using
Newspaper Page Decomposition Using a Split and Merge Approach (KH, OH, RI), pp. 1186–1189.
ICDARICDAR-2001-HouleBS #using
Handwriting Stroke Extraction Using a New XYTC Transform (GFH, KB, MS), pp. 91–95.
ICDARICDAR-2001-Hurst #layout #using
Layout and Language: Exploring Text Block Discovery in Tables Using Linguistic Resources (MH), pp. 523–527.
ICDARICDAR-2001-IwataYYKIM #identification #library #using
Book Cover Identification by Using Four Directional Features Filed for a Small-Scale Library System (KI, KY, MY, KK, MI, KM), pp. 582–586.
ICDARICDAR-2001-JinT #composition #locality #using
Text Area Localization under Complex-Background Using Wavelet Decomposition (NJ, YYT), pp. 1126–1130.
ICDARICDAR-2001-JustinoBS #random #using #verification
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
ICDARICDAR-2001-KimCKS #generative #recognition #string #using
Recognition of Unconstrained Handwritten Numeral Strings Using Decision Value Generator (KKK, YC, JHK, CYS), pp. 14–17.
ICDARICDAR-2001-KimSL #modelling #probability #using
Character Spotting Using Image-Based Stochastic Models (SKK, BKS, SWL), pp. 60–63.
ICDARICDAR-2001-KobayashiNMSA #flexibility #learning #recognition #statistics #using
Handwritten Numeral Recognition Using Flexible Matching Based on Learning of Stroke Statistics (TK, KN, HM, TS, KA), pp. 612–616.
ICDARICDAR-2001-KoshinakaNY #dependence #probability #recognition #using #word
A Stochastic Model for Handwritten Word Recognition Using Context Dependency Between Character Patterns (TK, DN, KY), pp. 154–158.
ICDARICDAR-2001-LeedhamTY #identification #markov #using
Handwritten Country Name Identification Using Vector Quantisation and Hidden Markov Model (GL, WKT, WLY), pp. 685–688.
ICDARICDAR-2001-LejtmanG #network #online #using #verification
On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
ICDARICDAR-2001-Likforman-Sulem #image #using #visual notation
Name Block Location in Facsimile Images Using Spatial/Visual Cues (LLS), pp. 680–684.
ICDARICDAR-2001-MartiMB #identification #using
Writer Identification Using Text Line Based Features (UVM, RM, HB), pp. 101–105.
ICDARICDAR-2001-NajmanGB #recognition #using
Indexing Technical Drawings Using Title Block Structure Recognition (LN, OG, SB), pp. 587–591.
ICDARICDAR-2001-NatarajanESM #markov #modelling #using
Videotext OCR Using Hidden Markov Models (PN, BE, RMS, JM), pp. 947–951.
ICDARICDAR-2001-NatteeN #classification #comprehension #documentation #geometry #machine learning #online #using
Geometric Method for Document Understanding and Classification Using On-line Machine Learning (CN, MN), pp. 602–606.
ICDARICDAR-2001-NishimuraTMMN #feature model #recognition #using
Off-line Hand-written Character Recognition Using Integrated 1D HMMs Based on Feature Extraction Filters (HN, MT, MM, HM, YN), pp. 417–423.
ICDARICDAR-2001-ParizeauLG #recognition #using
Character Recognition Experiments Using Unipen Data (MP, AL, CG), pp. 481–485.
ICDARICDAR-2001-RheeCK #feature model #online #segmentation #using #verification
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
ICDARICDAR-2001-RoneeUS #2d #linear #recognition #using
Handwritten Character Recognition Using Piecewise Linear Two-Dimensional Warping (MAR, SU, HS), pp. 39–43.
ICDARICDAR-2001-SerraduraSV #classification #markov #modelling #using #web
Web Sites Thematic Classification Using Hidden Markov Models (LS, MS, NV), pp. 1094–1099.
ICDARICDAR-2001-Smith #estimation #parametricity #using
Scanner Parameter Estimation Using Bilevel Scans of Star Charts (EHBS), pp. 1164–1168.
ICDARICDAR-2001-Souafi-BensafiPLE #logic #network #using
Logical Labeling Using Bayesien Networks (SSB, MP, FL, HE), pp. 832–836.
ICDARICDAR-2001-SrihariCL #pattern matching #pattern recognition #recognition #using
Establishing Handwriting Individuality Using Pattern Recognition Techniques (SNS, SHC, SL), p. 1195–?.
ICDARICDAR-2001-SuralD01a #fuzzy #multi #recognition #using
Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features (SS, PKD), pp. 1120–1125.
ICDARICDAR-2001-TaoT #using
Discrimination of Oriental and Euramerican Scripts Using Fractal Feature (YT, YYT), pp. 1115–1119.
ICDARICDAR-2001-UchidaTS #programming #using
Nonuniform Slant Correction Using Dynamic Programming (SU, ET, HS), pp. 434–438.
ICDARICDAR-2001-ValvenyM #learning #using
Learning of Structural Descriptions of Graphic Symbols Using Deformable Template Matching (EV, EM), pp. 455–459.
ICDARICDAR-2001-VincentF #approach #quantifier
Gray Level Use in a Handwriting Fractal Approach and Morphological Properties Quantification (NV, TF), pp. 307–311.
ICDARICDAR-2001-WakaharaKS #adaptation #normalisation #recognition #using
Handwritten Japanese Character Recognition Using Adaptive Normalization by Global Affine Transformation (TW, YK, MS), pp. 424–428.
ICDARICDAR-2001-WakedSB #documentation #image #using
Segmenting Document Images Using Diagonal White Runs and Vertical Edges (BW, CYS, SB), pp. 194–199.
ICDARICDAR-2001-WongSA01a #analysis #layout
Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
ICDARICDAR-2001-YeCS #classification #reduction #using
Reduction of the Classification Cost Using Hierarchical Classifiers based on the k-NN Rule (XY, MC, CYS), pp. 716–720.
ICDARICDAR-2001-YuanT #documentation #image #using
Text Extraction from Gray Scale Document Images Using Edge Information (QY, CLT), pp. 302–306.
ICDARICDAR-2001-ZhaoCSW #approach #segmentation #using
Handwritten Chinese Character Segmentation Using a Two-Stage Approach (SZ, ZC, PS, QW), pp. 179–183.
PODSPODS-2001-RajaramanU #query #using
Querying Websites Using Compact Skeletons (AR, JDU).
VLDBVLDB-2001-AndreiV #communication #using
User-Optimizer Communication using Abstract Plans in Sybase ASE (MA, PV), pp. 29–38.
VLDBVLDB-2001-BrownG #image #prototype #retrieval
A Prototype Content-Based Retrieval System that Uses Virtual Images to Save Space (LB, LG), pp. 693–694.
VLDBVLDB-2001-ChaudhuriS #database #relational #retrieval #using #xml
Storage and Retrieval of XML Data Using Relational Databases (SC, KS).
VLDBVLDB-2001-MaedaT #adaptation #named #using
ACTIVIEW: Adaptive data presentation using SuperSQL (YM, MT), pp. 695–696.
VLDBVLDB-2001-SakuraiYKU #adaptation #query #similarity #using
Similarity Search for Adaptive Ellipsoid Queries Using Spatial Transformation (YS, MY, RK, SU), pp. 231–240.
VLDBVLDB-2001-SundaraHCAS #documentation #framework #using #xml
Developing an Indexing Scheme for XML Document Collection using the Oracle8i Extensibility Framework (SS, YH, TC, NA, JS), pp. 701–702.
CSEETCSEET-2001-PortB #framework #product line #re-engineering #using
Using a Model Framework in Developing and Delivering a Family of Software Engineering Project Courses (DP, BWB), pp. 44–55.
ITiCSEITiCSE-2001-Barros #concurrent #petri net #programming
Use petri nets to improve your concurrent programming course (JPB), p. 192.
ITiCSEITiCSE-2001-BerqueJJ #education #using
Teaching theory of computation using pen-based computers and an electronic whiteboard (DAB, DKJ, LJ), pp. 169–172.
ITiCSEITiCSE-2001-ChoiC #design #education #interactive #learning #multi #object-oriented #using
Using interactive multimedia for teaching and learning object oriented software design (SHC, SC), p. 176.
ITiCSEITiCSE-2001-CiesielskiM #algorithm #animation #learning #student #using
Using animation of state space algorithms to overcome student learning difficulties (VC, PM), pp. 97–100.
ITiCSEITiCSE-2001-DannCP #education #recursion #using #visualisation
Using visualization to teach novices recursion (WD, SC, RP), pp. 109–112.
ITiCSEITiCSE-2001-Fone #concept #network #spreadsheet #using
Using a familiar package to demonstrate a difficult concept: using an excel spreadsheet model to explain the concepts of neural networks to undergraduates (WF), pp. 165–168.
ITiCSEITiCSE-2001-Fowler #prolog #using
Web-based CALL using prolog (AF), p. 181.
ITiCSEITiCSE-2001-Guzdial #collaboration #multi
Use of collaborative multimedia in computer science classes (MG), pp. 17–20.
ITiCSEITiCSE-2001-JoyceY01a
Electronic discussion boards: their use in post graduate computing courses (DJ, AY), p. 182.
ITiCSEITiCSE-2001-KoldehofeT #animation #distributed #interactive #using
Using actors in an interactive animation in a graduate course on distributed system (BK, PT), pp. 149–152.
ITiCSEITiCSE-2001-Lawhead #programming #using
Events robots and programming using legos in CS1 (PBL), p. 183.
ITiCSEITiCSE-2001-Medley #education #research #using
Using qualitative research software for CS education research (MDM), pp. 141–144.
ITiCSEITiCSE-2001-Rutherfoord #re-engineering #using
Using personality inventories to help form teams for software engineering class projects (RHR), pp. 73–76.
ITiCSEITiCSE-2001-ThomasL #distance #fault #learning #student #using
Observational studies of student errors in a distance learning environment using a remote recording and replay tool (PT, KL), pp. 117–120.
ESOPESOP-2001-KomondoorH #dependence #tool support #using
Tool Demonstration: Finding Duplicated Code Using Program Dependences (RK, SH), pp. 383–386.
ESOPESOP-2001-Thiemann #safety #using
Enforcing Safety Properties Using Type Specialization (PT), pp. 62–76.
FASEFASE-2001-Jurjens #development #towards #using
Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
FASEFASE-2001-Stevens #case study #modelling #on the
On Use Cases and Their Relationships in the Unified Modelling Language (PS), pp. 140–155.
TACASTACAS-2001-Khurshid #algorithm #search-based #testing #using
Testing an Intentional Naming Scheme Using Genetic Algorithms (SK), pp. 358–372.
TACASTACAS-2001-MycroftS #co-evolution #design #functional #hardware #using
Hardware/Software Co-Design Using Functional Languages (AM, RS), pp. 236–251.
TACASTACAS-2001-RuysLKLM #algebra #analysis #partial order #probability #process #using
First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
TACASTACAS-2001-WilliamsAH #diagrams #satisfiability #using
Satisfiability Checking Using Boolean Expression Diagrams (PFW, HRA, HH), pp. 39–51.
CSMRCSMR-2001-PodnarM #analysis #maintenance #process #simulation #using
Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
ICSMEICSM-2001-CaivanoLV #comprehension #estimation #process #using
Software Renewal Process Comprehension using Dynamic Effort Estimation (DC, FL, GV), pp. 209–218.
ICSMEICSM-2001-ChenCWYZZM #cvs #named #source code #using
CVSSearch: Searching through Source Code Using CVS Comments (AC, EC, JW, AYY, QZ, SZ, AM), p. 364–?.
ICSMEICSM-2001-DeanCSM #design #legacy #using
Using Design Recovery Techniques to Transform Legacy Systems (TRD, JRC, KAS, AJM), pp. 622–631.
ICSMEICSM-2001-EveraarsAK #concurrent #coordination #source code #using
Using Coordination to Restructure Sequential Source Code into a Concurrent Program (CTHE, FA, BK), p. 342–?.
ICSMEICSM-2001-GeihsB #distributed #framework #maintenance #object-oriented #quality
A Framework for Re-use and Maintenance of Quality of Service Mechanisms in Distributed Object Systems (KG, CB), pp. 470–478.
ICSMEICSM-2001-KataokaEGN #automation #invariant #refactoring #using
Automated Support for Program Refactoring Using Invariants (YK, MDE, WGG, DN), pp. 736–743.
ICSMEICSM-2001-Lemos #architecture #evolution #using
Describing Evolving Dependable Systems Using Co-Operative Software Architectures (RdL), p. 320–?.
ICSMEICSM-2001-MitchellM #algorithm #clustering #metric #similarity #using
Comparing the Decompositions Produced by Software Clustering Algorithms Using Similarity Measurements (BSM, SM), pp. 744–753.
ICSMEICSM-2001-OrsoHRRSD #component #testing #using
Using Component Metacontent to Support the Regression Testing of Component-Based Software (AO, MJH, DSR, GR, MLS, HD), pp. 716–725.
ICSMEICSM-2001-PoloPR #case study #legacy #maintenance #metric #predict #source code #using
Using Code Metrics to Predict Maintenance of Legacy Programs: A Case Study (MP, MP, FR), pp. 202–208.
ICSMEICSM-2001-TewksburyMM #corba #replication #using
Live Upgrades of CORBA Applications Using Object Replication (LAT, LEM, PMMS), p. 488–?.
IWPCIWPC-2001-EisenbarthKS #comprehension #concept analysis #execution #using
Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
IWPCIWPC-2001-GannodC #formal method #reverse engineering #tool support #using
A Suite of Tools for Facilitating Reverse Engineering Using Formal Methods (GCG, BHCC), pp. 221–232.
IWPCIWPC-2001-Sartipi01a #component #evaluation #using
A Software Evaluation Model Using Component Association Views (KS), pp. 259–268.
PASTEPASTE-2001-SouterP
Contextual def-use associations for object aggregation (ALS, LLP), pp. 13–19.
SCAMSCAM-2001-BurdR #analysis #automation #evolution #source code #using
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAMSCAM-2001-MaggiS #analysis #bytecode #data flow #java #using
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
SCAMSCAM-2001-SharmaC #maintenance #using
Application Maintenance Using Software Agents (AS, MAMC), pp. 57–66.
SCAMSCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
WCREWCRE-2001-El-RamlyISSM #interactive #modelling #using
Modeling the System-User Dialog Using Interaction Traces (MER, PI, ES, PGS, BM), p. 208–?.
WCREWCRE-2001-MiecznikowskiH #encapsulation #java #staged #using
Decompiling Java Using Staged Encapsulation (JM, LJH), pp. 368–374.
WCREWCRE-2001-Moonen #generative #robust #semiparsing #using
Generating Robust Parsers Using Island Grammars (LM), p. 13–?.
PLDIPLDI-2001-HeintzeT01a #alias #analysis #c #using
Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
PLDIPLDI-2001-KrintzC #optimisation #using
Using Annotation to Reduce Dynamic Optimization Time (CK, BC), pp. 156–167.
SASSAS-2001-KomondoorH #identification #slicing #source code #using
Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
STOCSTOC-2001-BolligW #bound #branch #integer #multi #using
A read-once branching program lower bound of Ω(2n/4) for integer multiplication using universal (BB, PW), pp. 419–424.
FLOPSFLOPS-2001-KamareddineLN #parametricity #using
Refining the Barendregt Cube Using Parameters (FK, TL, RN), pp. 375–390.
CIAACIAA-2001-AlegriaAEEU #finite #natural language #using
Using Finite State Technology in Natural Language Processing of Basque (IA, MJA, NE, AE, RU), pp. 1–12.
CIAACIAA-2001-HolzerK #encoding #image #order #using
Improving Raster Image Run-Length Encoding Using Data Order (MH, MK), pp. 161–176.
CIAACIAA-2001-KatritzkeMT #automaton #clustering #finite #image #using
Enhancements of Partitioning Techniques for Image Compression Using Weighted Finite Automata (FK, WM, MT), pp. 177–189.
ICALPICALP-2001-BrodalFPO #complexity #using
The Complexity of Constructing Evolutionary Trees Using Experiments (GSB, RF, CNSP, ), pp. 140–151.
ICALPICALP-2001-CohenHK #aspect-oriented #consistency #distributed #performance #using
Performance Aspects of Distributed Caches Using TTL-Based Consistency (EC, EH, HK), pp. 744–756.
FMFME-2001-LaurentMW #simulation #using #verification
Using Formal Verification Techniques to Reduce Simulation and Test Effort (OL, PM, VW), pp. 465–477.
ICFPICFP-2001-FluetW #using
Contification Using Dominators (MF, SW), pp. 2–13.
CHICHI-2001-BhavnaniRJ #education #identification #using
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
CHICHI-2001-ChiPCP #using #web
Using information scent to model user information needs and actions and the Web (EHhC, PP, KC, JEP), pp. 490–497.
CHICHI-2001-GarauSBS #communication #using
The impact of eye gaze on communication using humanoid avatars (MG, MS, SB, MAS), pp. 309–316.
CHICHI-2001-Grudin #clustering #monitoring #multi
Partitioning digital worlds: focal and peripheral awareness in multiple monitor use (JG), pp. 458–465.
CHICHI-2001-Salvucci #architecture #interface #predict #using
Predicting the effects of in-car interfaces on driver bahavior using a cognitive architecture (DDS), pp. 120–127.
CHICHI-2001-WoodruffFRMP #using #web
Using thumbnails to search the Web (AW, AF, RR, JM, PP), pp. 198–205.
VISSOFTSVIS-2001-Francik #algorithm #animation #data flow #using
Algorithm Animation Using Data Flow Tracing (JF), pp. 73–87.
VISSOFTSVIS-2001-OechsleS #automation #debugging #diagrams #interface #java #named #sequence chart #using #visualisation
JAVAVIS: Automatic Program Visualization with Object and Sequence Diagrams Using the Java Debug Interface (JDI) (RO, TS), pp. 176–190.
AdaEuropeAdaEurope-2001-English #education #library #named #user interface
JEWL: A GUI Library for Educational Use (JE), pp. 266–277.
AdaEuropeAdaEurope-2001-FoulgerK #fault #runtime #safety #tool support #using
Using the SPARK Toolset for Showing the Absence of Run-Time Errors in Safety-Critical Software (DF, SK), pp. 229–240.
AdaEuropeAdaEurope-2001-HeraudL #ada #interactive #using
Using Ada in Interactive Digital Television Systems (PH, TL), pp. 21–34.
AdaSIGAda-2001-ChenBY #adaptation #algorithm #detection #using
Detecting concurrently executed pairs of statements using an adapted MHP algorithm (ZC, BX, HY), pp. 107–114.
AdaSIGAda-2001-FaginME #ada #education #using
Teaching computer science with robotics using Ada/Mindstorms 2.0 (BSF, LDM, TWE), pp. 73–78.
AdaSIGAda-2001-Fassbender #ada #information management #re-engineering #uml #using
Reengineering an Ada95-programmed command and control information system by using UML (HF), pp. 53–60.
AdaSIGAda-2001-Taft #ada #compilation #using
Using Ada 95 in a compiler course (STT), pp. 79–80.
CAiSECAiSE-2001-GeneroOPR #information management #maintenance #metric #object-oriented #predict #using
Using Metrics to Predict OO Information Systems Maintainability (MG, JAO, MP, FPR), pp. 388–401.
CAiSECAiSE-2001-RoantreeKB #information management #integration #metadata #using
Using a Metadata Software Layer in Information Systems Integration (MR, JBK, PJB), pp. 299–314.
CAiSECAiSE-2001-SunyePHGJ #action semantics #execution #modelling #semantics #uml #using
Using UML Action Semantics for Executable Modeling and Beyond (GS, FP, WMH, ALG, JMJ), pp. 433–447.
EDOCEDOC-2001-ArreguiPW #middleware #scalability #using
Addressing Scalability Issues Using the CLF Middleware (DA, FP, JW), pp. 93–104.
EDOCEDOC-2001-LeffR #design pattern #development #mvc #using
Web-Application Development Using the Model/View/Controller Design Pattern (AL, JTR), pp. 118–127.
EDOCEDOC-2001-NealL #development #tool support #using
Tool Support for Development Using Patterns (SWN, PFL), p. 237–?.
EDOCEDOC-2001-WegmannN #concept #modelling #ontology #using
Conceptual Modeling of Complex Systems Using an RM-ODP Based Ontology (AW, AN), pp. 200–211.
ICEISICEIS-v1-2001-AllouiO #architecture #component #distributed #process #using
Supporting Decentralised Software-Intensive Processes Using ZETA Component-Based Architecture Description Language (IA, FO), pp. 207–215.
ICEISICEIS-v1-2001-BailinT #ontology #using
Ontology Negotiation Using JESS (SCB, WT), pp. 559–570.
ICEISICEIS-v1-2001-CarvalhoRMNK #fuzzy #logic #quantifier #using
Quantification of the Emotional Quotient of the Intelligence using the Classic and Fuzzy Logic (LFdC, RR, RRdM, SMN, CK), pp. 361–365.
ICEISICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation #using
Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
ICEISICEIS-v1-2001-DiazTO #machine learning #using
A Knowledge-Acquisition Methodology for a Blast Furnace Expert System Using Machine Learning Techniques (ED, JT, FO), pp. 336–339.
ICEISICEIS-v1-2001-MohanY01a #implementation #object-oriented #using
Implementing Business Rules in an Object-Oriented System Using JESS (PM, SY), pp. 553–558.
ICEISICEIS-v1-2001-SoonthornphisajK #algorithm #categorisation #problem #set #using #web
The Effects of Differnet Feature Sets on the Web Page Categorization Problem Using the Iterative Cross-Training Algorithm (NS, BK), pp. 404–410.
ICEISICEIS-v1-2001-ThorntonR #artificial reality #data mining #mining #network #using
Using Virtual Reality Data Mining for Network Management (KEBT, CR), pp. 340–344.
ICEISICEIS-v2-2001-Dawson #formal method #modelling #object-oriented #requirements
The Use of Formal and Informal Models in Object-Oriented Requirements Engineering (LD), pp. 753–760.
ICEISICEIS-v2-2001-FerreiraTS #internet #named #using
Webmaster — An Internet Information Support System for Academic Services Using ASP Technology (CF, LT, RS), pp. 967–973.
ICEISICEIS-v2-2001-JohnsonD #category theory #enterprise #information management #modelling #specification #using
Enterprise Information Systems: Specifying the Links among Project Data Models Using Category Theory (MJ, CNGD), pp. 619–626.
ICEISICEIS-v2-2001-NunesP #enterprise #identification #information management #modelling
The Use of Information Systems Modelling to Identify and Evaluate E-Business Strategies for Small and Medium Enterprises (SMES) (JMBN, DP), pp. 1018–1025.
ICEISICEIS-v2-2001-OliveiraFL #framework #information management #using #xml
Using XML and Frameworks to Develop Information Systems (TCdO, IMF, CJPdL), pp. 571–577.
ICEISICEIS-v2-2001-Rizk #education #web
The Use of Information on the Web to Enhance Teaching (NJR), pp. 1002–1009.
ICEISICEIS-v2-2001-ShishkovD #analysis #case study #diagrams #modelling #process
Analysis of Suitability, Appropriateness and Adequacy of Use Cases Combined with Activity Diagram for Business Systems Modelling (BS, JLGD), pp. 854–858.
ICEISICEIS-v2-2001-TehZ #using #web
The Web Server Using Dynamic Histograms (YWT, ABZ), pp. 962–966.
CIKMCIKM-2001-ChoHLP #integer #using
Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
CIKMCIKM-2001-HansenS #information retrieval #navigation #using #web
Using navigation Data to Improve IR functions in the Context of Web Search (MH, ES), pp. 135–142.
CIKMCIKM-2001-Shen #image #using
Finding Similar Images Quickly Using Object Shapes (HTS), pp. 498–505.
CIKMCIKM-2001-ZelikovitzH #classification #using
Using LSI for Text Classification in the Presence of Background Text (SZ, HH), pp. 113–118.
ICMLICML-2001-BlumC #graph #learning #using
Learning from Labeled and Unlabeled Data using Graph Mincuts (AB, SC), pp. 19–26.
ICMLICML-2001-DruckerSG #feedback #using
Relevance Feedback using Support Vector Machines (HD, BS, DCG), pp. 122–129.
ICMLICML-2001-GhaniSY #categorisation #hypermedia #using
Hypertext Categorization using Hyperlink Patterns and Meta Data (RG, SS, YY), pp. 178–185.
ICMLICML-2001-LiuECBT #3d #mobile #modelling #using
Using EM to Learn 3D Models of Indoor Environments with Mobile Robots (YL, RE, DC, WB, ST), pp. 329–336.
ICMLICML-2001-McGovernB #automation #learning #using
Automatic Discovery of Subgoals in Reinforcement Learning using Diverse Density (AM, AGB), pp. 361–368.
ICMLICML-2001-PapagelisK #using
Breeding Decision Trees Using Evolutionary Techniques (AP, DK), pp. 393–400.
ICMLICML-2001-RozsypalK #algorithm #classification #nearest neighbour #search-based #using
Using the Genetic Algorithm to Reduce the Size of a Nearest-Neighbor Classifier and to Select Relevant Attributes (AR, MK), pp. 449–456.
ICMLICML-2001-SandM #estimation #modelling #using
Repairing Faulty Mixture Models using Density Estimation (PS, AWM), pp. 457–464.
ICMLICML-2001-StrensM #policy #statistics #testing #using
Direct Policy Search using Paired Statistical Tests (MJAS, AWM), pp. 545–552.
ICMLICML-2001-Wiering #learning #using
Reinforcement Learning in Dynamic Environments using Instantiated Information (MW), pp. 585–592.
ICMLICML-2001-Wyatt #learning #using
Exploration Control in Reinforcement Learning using Optimistic Model Selection (JLW), pp. 593–600.
KDDKDD-2001-BasuMPG #using
Evaluating the novelty of text-mined rules using lexical knowledge (SB, RJM, KVP, JG), pp. 233–238.
KDDKDD-2001-CarageaCH #classification #using
Gaining insights into support vector machine pattern classifiers using projection-based tour methods (DC, DC, VH), pp. 251–256.
KDDKDD-2001-Dhillon #clustering #documentation #graph #using #word
Co-clustering documents and words using bipartite spectral graph partitioning (ISD), pp. 269–274.
KDDKDD-2001-GarckeG #data mining #mining #using
Data mining with sparse grids using simplicial basis functions (JG, MG), pp. 87–96.
KDDKDD-2001-HarelK #clustering #random #using
Clustering spatial data using random walks (DH, YK), pp. 281–286.
KDDKDD-2001-Kandogan #clustering #coordination #multi #roadmap #using #visualisation
Visualizing multi-dimensional clusters, trends, and outliers using star coordinates (EK), pp. 107–116.
KDDKDD-2001-SpanglerK #analysis #knowledge base #maintenance #using
Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
MLDMMLDM-2001-FischerB #automation #identification #using
Automatic Identification of Diatoms Using Decision Forests (SF, HB), pp. 173–183.
MLDMMLDM-2001-Krawiec #comparison #learning #on the #visual notation
On the Use of Pairwise Comparison of Hypotheses in Evolutionary Learning Applied to Learning from Visual Examples (KK), pp. 307–321.
MLDMMLDM-2001-Krzyzak #classification #learning #network #using
Nonlinear Function Learning and Classification Using Optimal Radial Basis Function Networks (AK), pp. 217–225.
SEKESEKE-2001-BarberGH #architecture #correctness #model checking #simulation #using
Evaluating Dynamic Correctness Properties of Domain Reference Architectures Using a Combination of Simulation and Model Checking (KSB, TJG, JH), pp. 19–28.
SEKESEKE-2001-BrisaboaPPR #database #ontology #using #web
Using ontologies for federation of Web accessible databases (NRB, MRP, ÁSP, FJR), pp. 87–94.
SEKESEKE-2001-BuenoJ #algorithm #automation #generative #search-based #testing #using
Automatic Test Data Generation for Program Paths Using Genetic Algorithms (PMSB, MJ), pp. 2–9.
SEKESEKE-2001-LemosP #information management #interactive #modelling #petri net #using
Methodology for Modeling Interactions in Cooperative Information Systems Using Colored Petri Nets (AJPL, AP), pp. 299–306.
SIGIRSIGIR-2001-Broch
Cite Me, Cite My References? (Scholarly Use of the ACM SIGIR Proceedings Based on Two Citation Indexes) (EB), pp. 446–447.
SIGIRSIGIR-2001-ChakrabartiJT #topic #using
Enhanced Topic Distillation Using Text, Markup Tags, and Hyperlinks (SC, MJ, VT), pp. 208–216.
SIGIRSIGIR-2001-CraswellHR #effectiveness #using
Effective Site Finding Using Link Anchor Information (NC, DH, SER), pp. 250–257.
SIGIRSIGIR-2001-Crestani #documentation #retrieval #towards
Towards the use of Prosodic Information for Spoken Document Retrieval (FC), pp. 420–421.
SIGIRSIGIR-2001-DrewL #classification #using
Construction of a Hierarchical Classifier Schema Using a Combination of Text-Based and Image-Based Approaches (MSD, CL), pp. 438–439.
SIGIRSIGIR-2001-GaoXZHNZ #information retrieval #modelling #query #statistics #using
Improving Query Translation for Cross-Language Information Retrieval Using Statistical Models (JG, EX, MZ, CH, JYN, JZ), pp. 96–104.
SIGIRSIGIR-2001-GongL #analysis #semantics #summary #using
Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
SIGIRSIGIR-2001-LeeS #clustering #image #learning #retrieval #using
Intelligent Object-based Image Retrieval Using Cluster-driven Personal Preference Learning (KML, WNS), pp. 436–437.
SIGIRSIGIR-2001-MillerRS #algorithm #matrix #using
Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
SIGIRSIGIR-2001-RuthvenRL #abduction #empirical #query #using
Empirical Investigations on Query Modification Using Abductive Explanations (IR, CJvR, ML), pp. 181–189.
SIGIRSIGIR-2001-SakaiR #feedback #flexibility #optimisation #pseudo #using
Flexible Pseudo-Relevance Feedback Using Optimization Tables (TS, SER), pp. 396–397.
SIGIRSIGIR-2001-SongB #concept #data flow #information management #using
Discovering Information Flow Using a High Dimensional Conceptual Space (DS, PB), pp. 327–333.
SIGIRSIGIR-2001-StentL #segmentation #using
Using Event Segmentation to Improve Indexing of Consumer Photographs (AS, ACL), pp. 59–65.
SIGIRSIGIR-2001-WenZN #clustering #feedback #query #using #word
Query Clustering Using Content Words and User Feedback (JRW, HZ, JYN), pp. 442–443.
UMLUML-2001-AndaDSJ #case study #development #industrial
Estimating Software Development Effort Based on Use Cases-Experiences from Industry (BA, HD, DIKS, MJ), pp. 487–502.
UMLUML-2001-BottoniKPT #ocl #using #visualisation
A Visualization of OCL Using Collaborations (PB, MK, FPP, GT), pp. 257–271.
UMLUML-2001-MetzOW #case study
Against Use Case Interleaving (PM, JO, WW), pp. 472–486.
UMLUML-2001-SendallS #behaviour #concurrent #constraints #ocl #specification #uml #using
Specifying Concurrent System Behavior and Timing Constraints Using OCL and UML (SS, AS), pp. 391–405.
ECOOPECOOP-2001-AndaSJ #case study #modelling #quality
Quality and Understandability of Use Case Models (BA, DIKS, MJ), pp. 402–428.
ECOOPECOOP-2001-HirzelDH #detection #garbage collection #liveness #on the
On the Usefulness of Liveness for Garbage Collection and Leak Detection (MH, AD, ALH), pp. 181–206.
ECOOPECOOP-2001-MeijerPY #dot-net #using
Scripting .NET Using Mondrian (EM, NP, AvY), pp. 150–164.
OOPSLAOOPSLA-2001-RountevMR #analysis #constraints #java #points-to #using
Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
OOPSLAOOPSLA-2001-Whaley #compilation #using
Partial Method Compilation using Dynamic Profile Information (JW), pp. 166–179.
TOOLSTOOLS-EUROPE-2001-Hoare
Growing Use of Assertions (CARH), p. 3.
TOOLSTOOLS-EUROPE-2001-MollerJ #using #xml
Enhancing Jini’s Lookup Service Using XML-Based Service Templates (MBM, BNJ), pp. 19–31.
TOOLSTOOLS-EUROPE-2001-Ramos-HernandezFBHBB #integration #object-oriented #process #using
Process Control Systems Integration Using Object Oriented Technology (DNRH, PJF, SB, SH, JMB, MJB), pp. 148–160.
TOOLSTOOLS-USA-2001-Behravanfar #architecture #generative #internet #using
Separation of Data and Presentation for the Next Generation Internet Using the Four-Tier Architecture (RB), pp. 83–88.
TOOLSTOOLS-USA-2001-Breuel #code generation #implementation #java #using
Implementing Dynamic Language Features in Java Using Dynamic Code Generation (TMB), pp. 143–152.
TOOLSTOOLS-USA-2001-GueheneucA #constraints #design pattern #detection #fault #using
Using Design Patterns and Constraints to Automate the Detection and Correction of Inter-Class Design Defects (YGG, HAA), pp. 296–306.
TOOLSTOOLS-USA-2001-Schultz #using
Using Mobility as a Competitive Weapon (ES), p. 9.
TOOLSTOOLS-USA-2001-Wu #enterprise #java #using #web
Building Web Applications Using Java 2 Enterprise Edition (CTW), pp. 355–356.
TOOLSTOOLS-USA-2001-WydaegheV #component #composition #using #visual notation
Visual Component Composition Using Composition Patterns (BW, WV), pp. 120–129.
GPCEGCSE-2001-WashizakiF #component #distance #using
Retrieving Software Components Using Directed Replaceability Distance (HW, YF), pp. 153–162.
LOPSTRLOPSTR-2001-FioravantiPP #infinity #process #program transformation #set #using #verification
Verification of Sets of Infinite State Processes Using Program Transformation (FF, AP, MP), pp. 111–128.
LOPSTRLOPSTR-2001-LeuschelG #deduction #model checking #using
Abstract Conjunctive Partial Deduction Using Regular Types and Its Application to Model Checking (ML, SG), pp. 91–110.
PPDPPPDP-2001-AbdennadherR #confluence #constraints #rule-based #theorem proving #using
Using Confluence to Generate Rule-Based Constraint Solvers (SA, CR), pp. 127–135.
PPDPPPDP-2001-Schmidt #declarative #programming #question #uml
Should UML Be Used for Declarative Programming? (DAS), pp. 1–3.
PADLPADL-2001-BaldoniBCP #logic #programming #using #web
Programming Goal-Driven Web Sites Using an Agent Logic Language (MB, CB, AC, VP), pp. 60–75.
PADLPADL-2001-Cirstea #authentication #protocol #specification #using
Specifying Authentication Protocols Using Rewriting and Strategies (HC), pp. 138–152.
PADLPADL-2001-Ramakrishnan #calculus #logic programming #model checking #using #μ-calculus
A Model Checker for Value-Passing μ-Calculus Using Logic Programming (CRR), pp. 1–13.
POPLPOPL-2001-Yahav #concurrent #java #logic #safety #source code #using #verification
Verifying safety properties of concurrent Java programs using 3-valued logic (EY), pp. 27–40.
RERE-2001-Alexander #case study
Capturing Use Cases with DOORS (IFA), p. 264.
RERE-2001-AllenbyK #requirements #safety #using
Deriving Safety Requirements Using Scenarios (KA, TK), pp. 228–235.
RERE-2001-Feather #detection #fault #reduction #using
Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
RERE-2001-MooreS #elicitation #requirements #using #visual notation
Requirements Elicitation Using Visual and Textual Information (JMM, FMSI), pp. 308–309.
SACSAC-2001-Ben-MiledSBNLAOGKNCMS #object-oriented #transaction #using
Global change master directory: object-oriented active asynchronous transaction management in a federated environment using data agents (ZBM, SS, OAB, KN, EL, MA, LO, CG, DK, TN, RC, GM, JS), pp. 207–214.
SACSAC-2001-Chainbi01a #paradigm #using
Using the object paradigm to deal with the agent paradigm: capabilities and limits (WC), pp. 585–589.
SACSAC-2001-CiSN #network #performance #using
Improving performance of MAC layer by using congestion control/avoidance methods in wireless network (SC, HS, GN), pp. 420–424.
SACSAC-2001-CuestaFB #architecture #coordination
Dynamic coordination architecture through the use of reflection (CECQ, PdlF, MBS), pp. 134–140.
SACSAC-2001-FernandesTMR #algorithm #problem #search-based #using
Using assortative mating in genetic algorithms for vector quantization problems (CMF, RT, CM, ACR), pp. 361–365.
SACSAC-2001-KallesK #design #game studies #learning #on the #using #verification
On verifying game designs and playing strategies using reinforcement learning (DK, PK), pp. 6–11.
SACSAC-2001-LawrenceB #database #relational #standard #taxonomy #using
Integrating relational database schemas using a standardized dictionary (RL, KB), pp. 225–230.
SACSAC-2001-Pressel
Fundamental limitations on the use of prefetching and stream buffers for scientific applications (DMP), pp. 554–559.
SACSAC-2001-SabharwalS #database #fourier #image #using
Indexing image databases using wavelet and discrete fourier transform (CLS, SRS), pp. 434–439.
SACSAC-2001-VuongSD #distributed #policy #security #using #xml
Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
SACSAC-2001-ZhouCH #correlation #identification #optimisation #problem #set #using
Identifying the most significant pairwise correlations of residues in different positions of helices: the subset selection problem using least squares optimization (XZ, GC, MTH), pp. 51–55.
FSEESEC-FSE-2001-CoadyKFS #composition #operating system #using
Using aspectC to improve the modularity of path-specific customization in operating system code (YC, GK, MJF, GS), pp. 88–98.
FSEESEC-FSE-2001-Coen-PorisiniDGP #execution #safety #symbolic computation #using #verification
Using symbolic execution for verifying safety-critical systems (ACP, GD, CG, MP), pp. 142–151.
FSEESEC-FSE-2001-Wendorff #approach #assessment #formal method #information management #modelling
A formal approach to the assessment and improvement of terminological models used in information systems engineering (PW), pp. 83–87.
FSEESEC-FSE-2001-Zundorf #case study #development #uml
From use cases to code---rigorous software development with UML (AZ), pp. 324–325.
ICSEICSE-2001-AmyotM #case study #design #requirements
Bridging the Requirements/Design Gap in Dynamic Systems with Use Case Maps (UCMs) (DA, GM), pp. 743–744.
ICSEICSE-2001-Baxter #maintenance #re-engineering #using
Using Transformation Systems for Software Maintenance and Reengineering (IDB), pp. 739–740.
ICSEICSE-2001-CampaillaCCJV #performance #using
Efficient Filtering in Publish-Subscribe Systems Using Binary Decision (AC, SC, EMC, SJ, HV), pp. 443–452.
ICSEICSE-2001-DillonS #analysis #graph #specification #using
Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
ICSEICSE-2001-Gray #component #framework #generative #using
Using Software Component Generators to Contstruct a Meta-Weaver Framework (JG), pp. 789–790.
ICSEICSE-2001-HakalaHKPVV #architecture #programming #using
Architecture-Oriented Programming Using FRED (MH, JH, KK, JP, AV, JV), pp. 823–824.
ICSEICSE-2001-HarmanJ #algorithm #metaheuristic #named #re-engineering #using
SEMINAL: Software Engineering Using Metaheuristic INnovative Algorithms (MH, BFJ), pp. 762–763.
ICSEICSE-2001-HobatrM #c++ #debugging #using
Using OCL-Queries for Debugging C++ (CH, BAM), pp. 839–840.
ICSEICSE-2001-HuntR #documentation #implementation #using #version control #web
Using the Web for Document Versioning: An Implementation Report for Delta V (JJH, JR), pp. 507–513.
ICSEICSE-2001-MaleticM #comprehension #semantics #using
Supporting Program Comprehension Using Semantic and Structural Information (JIM, AM), pp. 103–112.
ICSEICSE-2001-Mehta #evolution #legacy #re-engineering #using
Evolving Legacy Systems Using Feature Engineering and CBSE (AM), pp. 797–798.
ICSEICSE-2001-OvermyerLR #analysis #concept #modelling #using
Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
ICSEICSE-2001-ShullRB #using
Improving Software Inspections by Using Reading Techniques (FS, IR, VRB), pp. 726–727.
ICSEICSE-2001-Zundorf #case study #development #uml
From Use Cases to Code — Rigorous Software Development with UML (AZ), pp. 711–712.
LDTALDTA-2001-GayoDLR #composition #monad #named #prototype #semantics #using
LPS: A Language Prototyping System Using Modular Monadic Semantics (JELG, MCLD, JMCL, ACdR), pp. 110–131.
CCCC-2001-PominvilleQVHV #framework #java #optimisation #using
A Framework for Optimizing Java Using Attributes (PP, FQ, RVR, LJH, CV), pp. 334–354.
HPCAHPCA-2001-DelaluzKVSI #energy #hardware #using
DRAM Energy Management Using Software and Hardware Directed Power Mode Control (VD, MTK, NV, AS, MJI), pp. 159–169.
HPDCHPDC-2001-KuntrarukP #data mining #distributed #feature model #mining #parallel #using
Massively Parallel Distributed Feature Extraction in Textual Data Mining Using HDDI(tm) (JK, WMP), pp. 363–370.
HPDCHPDC-2001-NatrajanFHGWCB #case study #experience #grid #using
Studying Protein Folding on the Grid: Experiences Using CHARMM on NPACI Resources under Legion (AN, ADF, MAH, ASG, NWD, MC, CLBI), pp. 14–21.
HPDCHPDC-2001-SkicewiczDS #behaviour #multi #query #using
Multi-Resolution Resource Behaviour Queries Using Wavelets (JAS, PAD, JMS), pp. 395–394.
LCTESLCTES-OM-2001-LarusP #performance #scheduling #using
Using Cohort Scheduling to Enhance Server Performance (Extended Abstract) (JRL, MP), pp. 182–187.
PPoPPPPoPP-2001-LimLL #array #clustering #using
Blocking and array contraction across arbitrarily nested loops using affine partitioning (AWL, SWL, MSL), pp. 103–112.
SOSPSOSP-2001-RodriguesCL #abstraction #fault tolerance #named #using
BASE: Using Abstraction to Improve Fault Tolerance (RR, MC, BL), pp. 15–28.
SOSPSOSP-2001-SnoerenCG #using #xml
Mesh Based Content Routing using XML (ACS, KC, DKG), pp. 160–173.
SOSPSOSP-2001-SpalinkKPG #network #robust #using
Building a Robust Software-Based Router Using Network Processors (TS, SK, LLP, YG), pp. 216–229.
CAVCAV-2001-AbdeddaimM #automaton #scheduling #using
Job-Shop Scheduling Using Timed Automata (YA, OM), pp. 478–492.
CAVCAV-2001-Arons #consistency #using #verification
Using Timestamping and History Variables to Verify Sequential Consistency (TA), pp. 423–435.
CAVCAV-2001-BjesseLM #debugging #satisfiability #using
Finding Bugs in an α Microprocessor Using Satisfiability Solvers (PB, TL, AM), pp. 454–464.
CAVCAV-2001-KuehlmannB #using #verification
Transformation-Based Verification Using Generalized Retiming (AK, JB), pp. 104–117.
CAVCAV-2001-KwiatkowskaNS #automation #distributed #protocol #random #using #verification
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM (MZK, GN, RS), pp. 194–206.
ICLPICLP-2001-BasuMRRV #bisimulation #constraints #logic programming #using
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming (SB, MM, CRR, IVR, RMV), pp. 166–180.
IJCARIJCAR-2001-BoigelotJW #automaton #integer #linear #on the
On the Use of Weak Automata for Deciding Linear Arithmetic with Integer and Real Variables (BB, SJ, PW), pp. 611–625.
IJCARIJCAR-2001-Middeldorp #approximate #automaton #dependence #graph #using
Approximating Dependency Graphs Using Tree Automata Techniques (AM), pp. 593–610.
IJCARIJCAR-2001-Peltier #automation #deduction #using
A General Method for Using Schematizations in Automated Deduction (NP), pp. 578–592.
LICSLICS-2001-CookK #higher-order #reasoning #theorem #using
A Second-Order System for Polytime Reasoning Using Graedel’s Theorem (SAC, AK), pp. 177–186.
RTARTA-2001-KorovinV #order #using #verification
Verifying Orientability of Rewrite Rules Using the Knuth-Bendix Order (KK, AV), pp. 137–153.
RTARTA-2001-VestergaardB #confluence #first-order #proving #using #λ-calculus
A Formalised First-Order Confluence Proof for the λ-Calculus Using One-Sorted Variable Names (RV, JB), pp. 306–321.
ICSTSAT-2001-AmirM #composition #problem #satisfiability #using
Solving Satisfiability using Decomposition and the Most Constrained Subproblem (Preliminary Report) (EA, SM), pp. 329–343.
ICSTSAT-2001-JurkowiakLU #using
Parallelizing Satz Using Dynamic Workload Balancing (BJ, CML, GU), pp. 174–189.
ICSTSAT-2001-Kullmann #on the #satisfiability
On the use of autarkies for satisfiability decision (OK), pp. 231–253.
TLCATLCA-2001-Hofmann #behaviour #bound #complexity #memory management #type system
From Bounded Arithmetic to Memory Management: Use of Type Theory to Capture Complexity Classes and Space Behaviour (MH0), pp. 2–3.
TLCATLCA-2001-Pinto #geometry #implementation #interactive #modelling #parallel #using #λ-calculus
Parallel Implementation Models for the λ-Calculus Using the Geometry of Interaction (JSP), pp. 385–399.
CBSECBSE-2000-BurgHHMPSW
Exploring a Comprehensive CBD Method: Use of CBD/e in Practice (WDB, JSH, DPH, KM, ASP, SS, RW), p. 9.
ASEASE-2000-FahmyH #architecture #graph grammar #using
Using Graph Rewriting to Specify Software Architectural Transformations (HF, RCH), pp. 187–196.
ASEASE-2000-Li #case study #diagrams #sequence chart
Translating Use Cases to Sequence Diagrams (LL), pp. 293–296.
ASEASE-2000-LiuR #automation #security #using
Automated Security Checking and Patching Using TestTalk (CL, DJR), pp. 261–264.
ASEASE-2000-MansurovV #case study #interface #modelling #visual notation
New Visual Interface for Engineering Use Case Models (NM, DV), pp. 297–300.
ASEASE-2000-Monroy #abduction #recursion
The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures (RM), pp. 91–100.
ASEASE-2000-WiseCLMOS #coordination #re-engineering #using
Using Little-JIL to Coordinate Agents in Software Engineering (AEW, AGC, BSL, EKM, LJO, SMSJ), pp. 155–164.
DACDAC-2000-AttarhaNL #fault #fuzzy #logic #modelling #simulation #using
Modeling and simulation of real defects using fuzzy logic (AA, MN, CL), pp. 631–636.
DACDAC-2000-BergamaschiL #design #using
Designing systems-on-chip using cores (RAB, WRL), pp. 420–425.
DACDAC-2000-ChangCSM #detection #functional #performance #symmetry #using
Fast post-placement rewiring using easily detectable functional symmetries (CWJC, CKC, PS, MMS), pp. 286–289.
DACDAC-2000-ChiouJRD #embedded #memory management #using
Application-specific memory management for embedded systems using software-controlled caches (DC, PJ, LR, SD), pp. 416–419.
DACDAC-2000-DwarakanathB #fault #simulation #tuple #using
Universal fault simulation using fault tuples (KND, RDB), pp. 786–789.
DACDAC-2000-GhoshF #automation #diagrams #functional #generative #using
Automatic test pattern generation for functional RTL circuits using assignment decision diagrams (IG, MF), pp. 43–48.
DACDAC-2000-Hassoun #analysis #bound #using
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-HutchingsN #design #programming language #using
Using general-purpose programming languages for FPGA design (BLH, BEN), pp. 561–566.
DACDAC-2000-LuJCF #performance #using
Efficient variable ordering using aBDD based sampling (YL, JJ, EMC, MF), pp. 687–692.
DACDAC-2000-McDonaldB #clustering #scheduling #simulation #using
Symbolic timing simulation using cluster scheduling (CBM, REB), pp. 254–259.
DACDAC-2000-NouraniCP
Synthesis-for-testability of controller-datapath pairs that use gated clocks (MN, JC, CAP), pp. 613–618.
DACDAC-2000-QiuWP #petri net #power management #probability #using
Dynamic power management of complex systems using generalized stochastic Petri nets (QQ, QW, MP), pp. 352–356.
DACDAC-2000-QuP #constraints #using
Fingerprinting intellectual property using constraint-addition (GQ, MP), pp. 587–592.
DACDAC-2000-RaoN #power management #using
Power minimization using control generated clocks (MSR, SKN), pp. 794–799.
DACDAC-2000-VancorenlandRSG #algorithm #design #using
Optimal RF design using smart evolutionary algorithms (PJV, CDR, MS, GGEG), pp. 7–10.
DACDAC-2000-WilsonD #reliability #simulation #using #verification
Reliable verification using symbolic simulation with scalar values (CW, DLD), pp. 124–129.
DACDAC-2000-YeVKI #design #energy #estimation
The design and use of simplepower: a cycle-accurate energy estimation tool (WY, NV, MTK, MJI), pp. 340–345.
DACDAC-2000-YuKW #representation
The use of carry-save representation in joint module selection and retiming (ZY, KYK, ANWJ), pp. 768–773.
DATEDATE-2000-BergfeldNR #embedded #testing #using
Diagnostic Testing of Embedded Memories Using BIST (TJB, DN, EMR), pp. 305–309.
DATEDATE-2000-CarlettaPN #analysis #detection #fault #using
Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
DATEDATE-2000-CiricYS #implementation #logic #using
Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic (JC, GY, CS), pp. 277–282.
DATEDATE-2000-GaoW #using
Wire-Sizing for Delay Minimization and Ringing Control Using Transmission Line Model (YG, DFW), pp. 512–516.
DATEDATE-2000-JacobsB #statistics #using
Gate Sizing Using a Statistical Delay Model (ETAFJ, MRCMB), pp. 283–290.
DATEDATE-2000-KacNMZ #using
Alternative Test Methods Using IEEE 1149.4 (UK, FN, SM, MSZ), pp. 463–467.
DATEDATE-2000-KallaZCH #framework #paradigm #recursion #satisfiability #using
A BDD-Based Satisfiability Infrastructure Using the Unate Recursive Paradigm (PK, ZZ, MJC, CH), pp. 232–236.
DATEDATE-2000-KravetsS #symmetry #synthesis #using
Constructive Library-Aware Synthesis Using Symmetries (VNK, KAS), pp. 208–213.
DATEDATE-2000-ManquinhoS #algorithm #on the #satisfiability #using
On Using Satisfiability-Based Pruning Techniques in Covering Algorithms (VMM, JPMS), pp. 356–363.
DATEDATE-2000-Maurer #logic #network #simulation #state machine #using
Logic Simulation Using Networks of State Machines (PMM), pp. 674–678.
DATEDATE-2000-MorawiecUR #algorithm #diagrams #simulation #using
Cycle-Based Simulation Algorithms for Digital Systems Using High-Level Decision Diagrams (AM, RU, JR), p. 743.
DATEDATE-2000-PeesHM #using
Retargeting of Compiled Simulators for Digital Signal Processors Using a Machine Description Language (SP, AH, HM), pp. 669–673.
DATEDATE-2000-SilvaDM #configuration management #correlation #hardware #using
Mixed-Signal BIST Using Correlation and Reconfigurable Hardware (JMdS, JSD, JSM), p. 744.
DATEDATE-2000-SousaA #clustering #complexity #fault #modelling #using
Reducing the Complexity of Defect Level Modeling Using the Clustering Effect (JTdS, VDA), pp. 640–644.
DATEDATE-2000-VerkestKS #c++ #design #using
System Level Design Using C++ (DV, JK, FS), pp. 74–81.
DATEDATE-2000-WeilerMHH #detection #using
Detection of Defective Sensor Elements Using Sigma-Delta-Modulation and a Matched Filter (DW, OM, DH, BJH), pp. 599–603.
HTHT-2000-SmithSK #generative #orthogonal #taxonomy #using #video
An orthogonal taxonomy for hyperlink anchor generation in video streams using OvalTine (JMS, PDS, SUK), pp. 11–18.
PODSPODS-2000-GeertsK #approximate #database #linear #logic #transitive #using
Linear Approximation of Planar Spatial Databases Using Transitive-Closure Logic (FG, BK), pp. 126–135.
SIGMODSIGMOD-2000-FaloutsosSTT #using
Spatial Join Selectivity Using Power Laws (CF, BS, AJMT, CTJ), pp. 177–188.
SIGMODSIGMOD-2000-LitwinS #data type #distributed #scalability #using
LH*RS: A High-Availability Scalable Distributed Data Structure using Reed Solomon Codes (WL, TJES), pp. 237–248.
SIGMODSIGMOD-2000-Lomet #logic #online #using
High Speed On-line Backup When Using Logical Log Operations (DBL), pp. 34–45.
SIGMODSIGMOD-2000-OrdonezC #algorithm #clustering #named #performance #sql #using
SQLEM: Fast Clustering in SQL using the EM Algorithm (CO, PC), pp. 559–570.
SIGMODSIGMOD-2000-ZaharioudakisCLPU #automation #query #sql #summary #using
Answering Complex SQL Queries Using Automatic Summary Tables (MZ, RC, GL, HP, MU), pp. 105–116.
VLDBVLDB-2000-ChakrabartiGRS #approximate #query #using
Approximate Query Processing Using Wavelets (KC, MNG, RR, KS), pp. 111–122.
VLDBVLDB-2000-DiligentiCLGG #crawling #graph #using
Focused Crawling Using Context Graphs (MD, FC, SL, CLG, MG), pp. 527–534.
VLDBVLDB-2000-GuPS #database
OLAP++: Powerful and Easy-to-Use Federations of OLAP and Object Databases (JG, TBP, AS), pp. 599–602.
VLDBVLDB-2000-KoudasIM #identification #roadmap #set #sketching #using
Identifying Representative Trends in Massive Time Series Data Sets Using Sketches (PI, NK, SM), pp. 363–372.
VLDBVLDB-2000-PottingerL #algorithm #query #scalability #using
A Scalable Algorithm for Answering Queries Using Views (RP, AYL), pp. 484–495.
VLDBVLDB-2000-SakuraiYUK #approximate #using
The A-tree: An Index Structure for High-Dimensional Spaces Using Relative Approximation (YS, MY, SU, HK), pp. 516–526.
VLDBVLDB-2000-WangHH #constraints #mining #using
Mining Frequent Itemsets Using Support Constraints (KW, YH, JH), pp. 43–52.
VLDBVLDB-2000-WangZ #relational #sql #using
Using SQL to Build New Aggregates and Extenders for Object- Relational Systems (HW, CZ), pp. 166–175.
VLDBVLDB-2000-YagoubFIV00a #data-driven #using #web
Building and Customizing Data-Intensive Web Sites Using Weave (KY, DF, VI, PV), pp. 607–610.
CSEETCSEET-2000-CybulskiL #analysis #design #education #multi #using
Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
ITiCSEITiCSE-2000-Anderson #algorithm #geometry #interactive #student #using #visualisation
Algorithm visualization using QuickTime movies for student interaction (poster session).: algorithms from computational geometry (JMA), p. 185.
ITiCSEITiCSE-2000-Chalk #learning #re-engineering #using
Apprenticeship learning of software engineering using Webworlds (PC), pp. 112–115.
ITiCSEITiCSE-2000-Fagin #ada #education #using
Using Ada-based robotics to teach computer science (BSF), pp. 148–151.
ITiCSEITiCSE-2000-Hagan #education #java #using
Using BlueJ to teach Java (poster session) (DH), pp. 188–189.
ITiCSEITiCSE-2000-NelsonN #education #network #open source #using
Teaching computer networking using open source software (DN, YMN), pp. 13–16.
ITiCSEITiCSE-2000-OdekirkJJ #case study #experience #java #using
Three semesters of CSO using Java: assignments and experiences (EO, DJ, PJ), pp. 144–147.
ITiCSEITiCSE-2000-Sooriamurthi #abstraction #functional #recursion #using
Using recursion as a tool to reinforce functional abstraction (poster session) (RS), p. 194.
FASEFASE-2000-AnlauffKPS #component #composition #domain-specific language #using
Using Domain-Specific Languages for the Realization of Component Composition (MA, PWK, AP, AS), pp. 112–126.
FASEFASE-2000-ClavelDELMMQ #maude #using
Using Maude (MC, FD, SE, PL, NMO, JM, JFQ), pp. 371–374.
FASEFASE-2000-GruerHK #design #network #problem #specification #using #verification
Verification of Object-Z Specifications by Using Transition Systems: Application to the Radiomobile Network Design Problem (PG, VH, AK), pp. 222–236.
FASEFASE-2000-HuizingK #invariant #object-oriented #source code #using #verification
Verification of Object Oriented Programs Using Class Invariants (KH, RK), pp. 208–221.
FASEFASE-2000-HuneS #automaton #case study #synthesis #using
A Case Study on Using Automata in Control Synthesis (TH, AS), pp. 349–362.
FASEFASE-2000-LanoAC #design #using
Structuring and Design of Reactive Systems Using RSDS and B (KL, KA, DC), pp. 97–111.
FASEFASE-2000-Parisi-PresicceW #configuration management #graph transformation #policy #using
Foundations for Software Configuration Management Policies Using Graph Transformations (FPP, ALW), pp. 304–318.
FASEFASE-2000-Wehrheim #automation #case study #formal method #specification #using
Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods (HW), pp. 334–348.
TACASTACAS-2000-AlfaroKNPS #model checking #probability #process #representation #using
Symbolic Model Checking of Probabilistic Processes Using MTBDDs and the Kronecker Representation (LdA, MZK, GN, DP, RS), pp. 395–410.
TACASTACAS-2000-BenerecettiG #logic #model checking #protocol #security #using
Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
TACASTACAS-2000-BozgaFG #automation #generative #static analysis #testing #using
Using Static Analysis to Improve Automatic Test Generation (MB, JCF, LG), pp. 235–250.
TACASTACAS-2000-RoychoudhuryKRRS #logic programming #program transformation #using #verification
Verification of Parameterized Systems Using Logic Program Transformations (AR, KNK, CRR, IVR, SAS), pp. 172–187.
WCREWCRE-J-1997-JerdingR00 #architecture #locality #using #visualisation
Using visualization for architectural localization and extraction (DFJ, SR), pp. 267–284.
CSMRCSMR-2000-BojicV #architecture #comprehension #re-engineering #reuse
A Use-Case Driven Method of Architecture Recovery for Program Understanding and Reuse Reengineering (DB, DMV), pp. 23–32.
CSMRCSMR-2000-BrilFGKW #algebra #multi #using
Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
CSMRCSMR-2000-SartipiKM #architecture #data mining #design #mining #using
Architectural Design Recovery using Data Mining Techniques (KS, KK, FM), pp. 129–140.
ICSMEICSM-2000-HuMDL #analysis #c #c++ #compilation #execution #symbolic computation #using
C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
ICSMEICSM-2000-MockusV #database #identification #using
Identifying Reasons for Software Changes using Historic Databases (AM, LGV), pp. 120–130.
IWPCIWPC-2000-ChenR #case study #dependence #feature model #graph #using
Case Study of Feature Location Using Dependence Graph (KC, VR), pp. 241–247.
WCREWCRE-2000-CagninPBM #design pattern #re-engineering #using
Reengineering Using Design Patterns (MIC, RP, RTVB, PCM), pp. 118–127.
WCREWCRE-2000-CzeranskiEKKS #tool support #using
Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
WCREWCRE-2000-DeursenM #legacy #using
Exploring Legacy Systems using Types (AvD, LM), pp. 32–41.
WCREWCRE-2000-LuccaFC #approach #case study #modelling #object-oriented #thread
Recovering Use Case Models from Object-Oriented Code: A Thread-based Approach (GADL, ARF, UdC), pp. 108–117.
WCREWCRE-2000-MamasK #source code #towards #using #xml
Towards Portable Source Code Representations using XML (EM, KK), p. 172–?.
WCREWCRE-2000-MartinWWM #using
Analyzing xfig Using the Rigi Tool Suite (JM, KW, BW, HAM), pp. 207–209.
WCREWCRE-2000-MuthannaKPS #design #industrial #maintenance #metric #using
A Maintainability Model for Industrial Software Systems using Design Level Metrics (SM, KK, KP, BS), p. 248–?.
PEPMPEPM-2000-GallagherP #approximate #using
Using Regular Approximations for Generalisation During Partial Evalution (JPG, JCP), pp. 44–51.
PLDIPLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer #using
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-FahndrichRD #analysis #constraints #scalability #using
Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
PLDIPLDI-2000-GhemawatRS #analysis #interprocedural #low cost
Field analysis: getting useful and low-cost interprocedural information (SG, KHR, DJS), pp. 334–344.
PLDIPLDI-2000-HeydonLY #dependence #precise #using
Caching function calls using precise dependencies (AH, RL, YY), pp. 311–320.
PLDIPLDI-2000-WilkenLH #integer #programming #scheduling #using
Optimal instruction scheduling using integer programming (KDW, JL, MH), pp. 121–133.
STOCSTOC-2000-AdlerL #multi #performance #using
Compression using efficient multicasting (MA, FTL), pp. 153–162.
STOCSTOC-2000-Boneh #integer #using
Finding smooth integers in short intervals using CRT decoding (DB), pp. 265–272.
STOCSTOC-2000-HallgrenRT #quantum #re-engineering #using
Normal subgroup reconstruction and quantum computation using group representations (SH, AR, ATS), pp. 627–635.
ICALPICALP-2000-GhicaM #algol #reasoning #regular expression #using
Reasoning about Idealized ALGOL Using Regular Languages (DRG, GM), pp. 103–115.
IFMIFM-2000-MeyerS #approach #behaviour #consistency #uml #using #verification
Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
IFMIFM-2000-Schulte #formal method #question #why
Why Doesn’t Anyone Use Formal Methods? (WS), pp. 297–298.
CHICHI-2000-JanckeGG #design
Presenting to local and remote audiences: design and use of the TELEP system (GJ, JG, AG), pp. 384–391.
CHICHI-2000-MyersLY #using
Two-handed input using a PDA and a mouse (BAM, KPL, BCY), pp. 41–48.
CHICHI-2000-PatrickCSRVC #artificial reality #scalability #using
Using a large projection screen as an alternative to head-mounted displays for virtual environments (EP, DC, AS, JAR, TV, GC), pp. 478–485.
CHICHI-2000-TaylorR #communication #consistency #semantics #using
Gaze communication using semantically consistent spaces (MJT, SMR), pp. 400–407.
CHICHI-2000-WatsonFM #predict #quality #using
Using naming time to evaluate quality predictors for model simplification (BW, AF, AM), pp. 113–120.
CSCWCSCW-2000-CadizGG #collaboration #documentation #using #web
Using Web annotations for asynchronous collaboration around documents (JJC, AG, JG), pp. 309–318.
CSCWCSCW-2000-LitiuP #adaptation #component #framework #mobile #using
Developing adaptive groupware applications using a mobile component framework (RL, AP), pp. 107–116.
CSCWCSCW-2000-YanoNIM #interface #using
Shared walk environment using locomotion interfaces (HY, HN, HI, TM), pp. 163–170.
AdaEuropeAdaEurope-2000-CloshenH #ada #implementation #programming #using
An Ada95 Programming Style Checker Using the GNAT ASIS Implementation (PC, HJH), pp. 149–160.
AdaEuropeAdaEurope-2000-FlintD #ada #api #compilation #java #using
Using JavaTM APIs with Native Ada Compilers (SF, BD), pp. 41–55.
AdaEuropeAdaEurope-2000-HovaterMB #design #documentation #generative #interface #using
Generation of Interface Design Description Documents Using ASIS (SVH, WM, AB), pp. 138–148.
AdaEuropeAdaEurope-2000-MauriS #analysis #embedded #reliability #safety #using
Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
AdaEuropeAdaEurope-2000-SoundarajanF #exception #object-oriented #reasoning #using
Exceptions in OO Languages: Using Them and Reasoning about Them (NS, SF), pp. 238–251.
CAiSECAiSE-2000-TombrosG #framework #using #workflow
Building Extensible Workflow Systems Using an Event-Based Infrastructure (DT, AG), pp. 325–339.
ICEISICEIS-2000-Barn #component #enterprise #java #modelling #using #web
Modelling and Building Component Based Web Applications Using Enterprise Java Beans (BB), p. XXXI-XXXII.
ICEISICEIS-2000-Bosilj-VuksicGH #diagrams #modelling #petri net #process
IDEF Diagrams and Petri Nets for Business Process Modelling: Suitability, Efficacy, and Complementary Use (VBV, GMG, VH), pp. 242–247.
ICEISICEIS-2000-DawsonS #lazy evaluation #requirements #specification #using
Requirements Specification for Electronic Services Delivery Applications Using “Lazy Dog” Templates (LD, AS), pp. 261–266.
ICEISICEIS-2000-Emery #case study #network
The Use of Information Theory in the Construction of a Bayesian Belief Network: A Case Study (DEE), pp. 121–126.
CIKMCIKM-2000-AslamPR #clustering #using
Using Star Clusters for Filtering (JAA, KP, DR), pp. 306–313.
CIKMCIKM-2000-BoughanemT #algorithm #optimisation #query #search-based #using
Query Optimization Using An Improved Genetic Algorithm (MB, LT), pp. 368–373.
CIKMCIKM-2000-Elworthy #database #image #natural language #retrieval #using
Retrieval from Captioned Image Databases Using Natural Language Processing (DE), pp. 430–437.
CIKMCIKM-2000-MakawitaTL #database #using
Sampling from Databases Using B+-Trees (DPM, KLT, HL), pp. 158–164.
CIKMCIKM-2000-WuAA #approximate #composition #query #using
Using Wavelet Decomposition to Support Progressive and Approximate Range-Sum Queries over Data Cubes (YLW, DA, AEA), pp. 414–421.
ICMLICML-2000-CravenPSBG #coordination #learning #multi #using
Using Multiple Levels of Learning and Diverse Evidence to Uncover Coordinately Controlled Genes (MC, DP, JWS, JB, JDG), pp. 199–206.
ICMLICML-2000-Eskin #detection #probability #semistructured data #using
Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
ICMLICML-2000-Ghani #classification #using
Using Error-Correcting Codes for Text Classification (RG), pp. 303–310.
ICMLICML-2000-KatayamaKK #learning #using
A Universal Generalization for Temporal-Difference Learning Using Haar Basis Functions (SK, HK, SK), pp. 447–454.
ICMLICML-2000-LagoudakisL #algorithm #learning #using
Algorithm Selection using Reinforcement Learning (MGL, MLL), pp. 511–518.
ICMLICML-2000-LiB #approach #clustering #markov #modelling #using
A Bayesian Approach to Temporal Data Clustering using Hidden Markov Models (CL, GB), pp. 543–550.
ICMLICML-2000-MorimotoD #behaviour #learning #using
Acquisition of Stand-up Behavior by a Real Robot using Hierarchical Reinforcement Learning (JM, KD), pp. 623–630.
ICMLICML-2000-Rosenberg #image #statistics #using
Image Color Constancy Using EM and Cached Statistics (CRR), pp. 799–806.
ICMLICML-2000-ShultzR #comparison #knowledge-based #learning #multi #using
Using Knowledge to Speed Learning: A Comparison of Knowledge-based Cascade-correlation and Multi-task Learning (TRS, FR), pp. 871–878.
ICMLICML-2000-SohT #image #learning #using
Using Learning by Discovery to Segment Remotely Sensed Images (LKS, CT), pp. 919–926.
ICMLICML-2000-ThollardDH #automaton #probability #using
Probabilistic DFA Inference using Kullback-Leibler Divergence and Minimality (FT, PD, CdlH), pp. 975–982.
ICMLICML-2000-WalkerWL #comprehension #fault #identification #natural language #using
Using Natural Language Processing and discourse Features to Identify Understanding Errors (MAW, JHW, IL), pp. 1111–1118.
ICMLICML-2000-WesterdijkW #classification #modelling #multi #using
Classification with Multiple Latent Variable Models using Maximum Entropy Discrimination (MW, WW), pp. 1143–1150.
ICMLICML-2000-Zaanen #learning #recursion #syntax #using
Bootstrapping Syntax and Recursion using Alginment-Based Learning (MvZ), pp. 1063–1070.
ICMLICML-2000-ZelikovitzH #classification #problem #using
Improving Short-Text Classification using Unlabeled Data for Classification Problems (SZ, HH), pp. 1191–1198.
ICPRICPR-v1-2000-AleixosBMN #assessment #quality #realtime #using
Assessment of Citrus Fruit Quality Using a Real-Time Machine Vision System (NA, JB, EM, FN), pp. 1482–1485.
ICPRICPR-v1-2000-AnsiaLPM #3d #automation #re-engineering #segmentation #using
Automatic 3D Shape Reconstruction of Bones Using Active Nets Based Segmentation (FMA, JL, MGP, AMG), pp. 1486–1489.
ICPRICPR-v1-2000-ArlandisPL #distance #recognition #using
Handwritten Character Recognition using the Continuous Distance Transformation (JA, JCPC, RL), pp. 1940–1943.
ICPRICPR-v1-2000-AyersC #network #recognition #using #video
Scenario Recognition from Video Using a Hierarchy of Dynamic Belief Networks (DA, RC), pp. 1835–1838.
ICPRICPR-v1-2000-BaldwinB #3d #estimation #using
3D Estimation using Panoramic Stereo (JB, AB), pp. 1097–1100.
ICPRICPR-v1-2000-Bayro-Corrochano #algebra #invariant #using
Computing Depth, Shape and Motion Using Invariants and Incidence Algebra (EBC), pp. 1881–1884.
ICPRICPR-v1-2000-BesshoIY #detection #using
Detecting Human Face and Recognizing Facial Expressions Using Potential Net (HB, YI, MY), pp. 5076–5079.
ICPRICPR-v1-2000-BorsHW #image #modelling #using
Terrain Modeling in Synthetic Aperture Radar Images Using Shape-from-Shading (AGB, ERH, RCW), pp. 1798–1801.
ICPRICPR-v1-2000-Boufama #synthesis
The Use of Homographies for View Synthesis (BB), pp. 1563–1566.
ICPRICPR-v1-2000-Bourgeois #image #retrieval #using
Content Based Image Retrieval Using Gradient Color Fields (FLB), pp. 5027–5030.
ICPRICPR-v1-2000-DuffyCL #detection #using
Object Detection Using Color (ND, JLC, GL), pp. 1700–1703.
ICPRICPR-v1-2000-Farneback #estimation #modelling #parametricity #performance #using
Fast and Accurate Motion Estimation Using Orientation Tensors and Parametric Motion Models (GF), pp. 1135–1139.
ICPRICPR-v1-2000-Fernandez #similarity #using
Implicit Model-Oriented Optimal Thresholding Using the Komolgorov-Smirnov Similarity Measure (XF), pp. 1466–1469.
ICPRICPR-v1-2000-GagaudakisRC #database #image #network #using #visualisation
Using CBIR and Pathfinder Networks for Image Database Visualization (GG, PLR, CC), pp. 5052–5055.
ICPRICPR-v1-2000-HeikkilaSS #estimation #segmentation #using
Camera Motion Estimation from Non-Stationary Scenes Using EM-Based Motion Segmentation (JH, PS, OS), pp. 1370–1374.
ICPRICPR-v1-2000-HsiehF #image #retrieval #using
Color Image Retrieval Using Shape and Spatial Properties (ISH, KCF), pp. 5023–5026.
ICPRICPR-v1-2000-HuangH #using
Road Sign Interpretation Using Matching Pursuit Method (CLH, SHH), pp. 1329–1334.
ICPRICPR-v1-2000-KampkeES #estimation #image #network #using
Estimation of Superresolution Images Using Causal Networks: The One-Dimensional Case (TK, AE, CS), pp. 1584–1587.
ICPRICPR-v1-2000-KimH00a #self #using #video
Soccer Video Mosaicing Using Self-Calibration and Line Tracking (HK, KSH), pp. 1592–1595.
ICPRICPR-v1-2000-KrugerHS #network #realtime #using
Affine Real-Time Face Tracking using Gabor Wavelet Networks (VK, AH, GS), pp. 1127–1130.
ICPRICPR-v1-2000-KumarSR #detection #realtime #recognition #using
Real Time Detection and Recognition of Human Profiles Using Inexpensive Desktop Cameras (PK, KS, SR), pp. 5096–5099.
ICPRICPR-v1-2000-LhuillierQ #constraints #geometry #robust #using
Robust Dense Matching Using Local and Global Geometric Constraints (ML, LQ), pp. 1968–1972.
ICPRICPR-v1-2000-LiuB #using
Uncalibrated Stereo Matching Using DWT (HL, PB), pp. 1114–1118.
ICPRICPR-v1-2000-LiuRC #geometry #using
Using Geometric Properties of Correspondence Vectors for the Registration of Free-Form Shapes (YL, MAR, DC), pp. 5011–5014.
ICPRICPR-v1-2000-Louchet #analysis #evolution #using
Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
ICPRICPR-v1-2000-LourakisTAO #3d #constraints #geometry #using
Using Geometric Constraints for Matching Disparate Stereo Views of 3D Scenes Containing Planes (MIAL, SVT, AAA, SCO), pp. 1419–1422.
ICPRICPR-v1-2000-Mitchell #analysis #documentation #layout #segmentation #using
Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
ICPRICPR-v1-2000-MossH #markov #monte carlo #using
Alignment and Correspondence Using Markov Chain Monte Carlo (SM, ERH), pp. 1928–1931.
ICPRICPR-v1-2000-NandyB #3d #recognition #using
Recovery of 3-D Face Structure Using Recognition (DN, JBA), pp. 5104–5108.
ICPRICPR-v1-2000-NielsenP #adaptation #problem #representation #segmentation #using
A Solution to the Problem of Segmentation near Edges Using Adaptable Class-Specific Representation (CFN, PJP), pp. 1436–1440.
ICPRICPR-v1-2000-OkutomiS #image #using
Shape Recovery of Rotating Object Using Weighted Voting of Spatio-Temporal Image (MO, SS), pp. 1790–1793.
ICPRICPR-v1-2000-PalettaPP #analysis #learning #recognition #using
Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
ICPRICPR-v1-2000-PaquisLK #classification #using
Road Surface Classification by Thresholding Using Morphological Pyramid (SP, VL, HK), pp. 1334–1337.
ICPRICPR-v1-2000-ParkA #image #interactive #multi #recognition #using
Recognition of Human Interaction Using Multiple Features in Grayscale Images (SP, JKA), pp. 1051–1054.
ICPRICPR-v1-2000-ParkLL #3d #modelling #re-engineering #recognition #using
Recognition and Reconstruction of 3-D Objects Using Model-Based Perceptual Grouping (IKP, SUL, KML), pp. 1720–1724.
ICPRICPR-v1-2000-RavyseSCR #composition #detection #process #recognition #using
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition (IR, HS, JC, MJTR), pp. 5080–5083.
ICPRICPR-v1-2000-SkocajL #image #using
Range Image Acquisition of Objects with Non-Uniform Albedo Using Structured Light Range Sensor (DS, AL), pp. 1778–1781.
ICPRICPR-v1-2000-SomeyaKHI #3d #locality #segmentation #using
Localization of Objects in Electric Distribution Systems by Using Segmentation and 3D Template Matching with M-Estimators (YS, KK, KH, KI), pp. 1725–1729.
ICPRICPR-v1-2000-SteinbachGEB #3d #multi #re-engineering #using
3-D Object Reconstruction Using Spatially Extended Voxels and Multi-Hypothesis Voxel Coloring (EGS, BG, PE, AB), pp. 1774–1777.
ICPRICPR-v1-2000-Weik #using
A Passive Full Body Scanner Using Shape from Silhouettes (SW), pp. 1750–1753.
ICPRICPR-v1-2000-WeissR #using
Recognizing Articulated Objects Using Invariance (IW, MR), pp. 1055–1058.
ICPRICPR-v1-2000-WorthingtonH #recognition #using
Structural Object Recognition Using Shape-from-Shading (PLW, ERH), pp. 1738–1741.
ICPRICPR-v1-2000-XueLT #invariant #performance #using
Efficient Object Matching Using Affine-Invariant Deformable Contour (ZX, SZL, EKT), pp. 1672–1675.
ICPRICPR-v1-2000-ZhouH #image #representation #retrieval #using
Image Representation and Retrieval Using Structural Features (XSZ, TSH), pp. 5039–5042.
ICPRICPR-v2-2000-AlexandreCK #classification #independence #using
Combining Independent and Unbiased Classifiers Using Weighted Average (LAA, ACC, MSK), pp. 2495–2498.
ICPRICPR-v2-2000-AokiK #image #using
An Image Storage System Using Complex-Valued Associative Memories (HA, YK), pp. 2626–2629.
ICPRICPR-v2-2000-BaggenstossN #classification #probability #using
A Theoretically Optimal Probabilistic Classifier Using Class-Specific Features (PMB, HN), pp. 2763–2768.
ICPRICPR-v2-2000-BajaS #3d #distance #editing #image #using
Editing 3D Binary Images Using Distance Transforms (GSdB, SS), pp. 6030–6033.
ICPRICPR-v2-2000-BartoliPSZ #graph #morphism #using
Attributed Tree Homomorphism Using Association Graphs (MB, MP, KS, SWZ), pp. 2133–2136.
ICPRICPR-v2-2000-BauerHK #recognition #statistics #using
Video-Based Continuous Sign Language Recognition Using Statistical Methods (BB, HH, KFK), pp. 2463–2466.
ICPRICPR-v2-2000-Bax #using #validation
Using Validation by Inference to Select a Hypothesis Function (EB), pp. 2700–2703.
ICPRICPR-v2-2000-Berthilsson #recognition #using
Character Recognition Using Shape for Curves (RB), pp. 2227–2230.
ICPRICPR-v2-2000-BhattacharyaDPCLR #adaptation #image #using
Shape Extraction of Volumetric Images of Filamentous Bacteria Using Topology Adaptive Self Organization (UB, AD, SKP, BBC, VL, KR), pp. 2291–2294.
ICPRICPR-v2-2000-BovisS #detection #using
Detection of Masses in Mammograms Using Texture Features (KB, SS), pp. 2267–2270.
ICPRICPR-v2-2000-BradleyRF #clustering #database #modelling #scalability #using
Clustering Very Large Databases Using EM Mixture Models (PSB, CR, UMF), pp. 2076–2080.
ICPRICPR-v2-2000-ChazalR #classification #comparison
A Comparison of the Use of Different Wavelet Coefficients for the Classification of the Electrocardiogram (PdC, RBR), pp. 2255–2258.
ICPRICPR-v2-2000-ChenSWS #estimation #using
Head Pose Estimation Using both Color and Feature Information (QC, TS, HW, TS), pp. 2842–2841.
ICPRICPR-v2-2000-ChenW #analysis #segmentation #string #using
Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
ICPRICPR-v2-2000-CorreiaC #optimisation #recognition #using
Optimizing the Recognition Rates of Unconstrained Handwritten Numerals Using Biorthogonal Spline Wavelets (SENC, JMdC), pp. 2251–2254.
ICPRICPR-v2-2000-DahmenKGN #image #invariant #recognition #using
Invariant Image Object Recognition Using Mixture Densities (JD, DK, MOG, HN), pp. 2614–2617.
ICPRICPR-v2-2000-DehghanFAS #fuzzy #markov #modelling #recognition #using #word
Off-Line Unconstrained Farsi Handwritten Word Recognition Using Fuzzy Vector Quantization and Hidden Markov Word Models (MD, KF, MA, MS), pp. 2351–2354.
ICPRICPR-v2-2000-Fursov #pattern matching #pattern recognition #recognition #using
Training in Pattern Recognition from a Small Number of Observations Using Projections onto Null-Space (VAF), pp. 2785–2788.
ICPRICPR-v2-2000-GuillaudBRBT #detection #multi #using
Continuity Perception Using a Multiagent System: An Application to Growth Ring Detection on Fish Otoliths (AG, AB, VR, JLB, HT), pp. 2519–2522.
ICPRICPR-v2-2000-GuoDR #detection #using
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
ICPRICPR-v2-2000-HolzL #set #using #validation
Validation of Relative Feature Importance Using a Natural Data Set (HJH, MHL), pp. 2414–2417.
ICPRICPR-v2-2000-HuangY #using #verification
Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
ICPRICPR-v2-2000-JainJV #experience #network #using
Short-Term Water Demand Forecasting Using Artificial Neural Networks: IIT Kanpur Experience (AJ, UCJ, AKV), pp. 2459–2462.
ICPRICPR-v2-2000-JuanV #classification #edit distance #normalisation #on the #performance #string
On the Use of Normalized Edit Distances and an Efficient k-NN Search Technique (k-AESA) for Fast and Accurate String Classification (AJ, EV), pp. 2676–2679.
ICPRICPR-v2-2000-KanekoGF #3d #recognition #using
Abdominal Organ Recognition Using 3D Mathematical Morphology (TK, LG, HF), pp. 2263–2266.
ICPRICPR-v2-2000-KatoOA #modelling #precise #recognition #using
Precise Hand-printed Character Recognition Using Elastic Models via Nonlinear Transformation (TK, SO, HA), pp. 2364–2367.
ICPRICPR-v2-2000-KavallieratouSFK #learning #segmentation #using
Handwritten Character Segmentation Using Transformation-Based Learning (EK, ES, NF, GKK), pp. 2634–2637.
ICPRICPR-v2-2000-LaiCF #canonical #correlation #using
Power Load Forecasting Using Neural Canonical Correlates (PLL, SJC, CF), pp. 2455–2458.
ICPRICPR-v2-2000-LaoKST #3d #invariant #recognition #using
3D Template Matching for Pose Invariant Face Recognition Using 3D Facial Model Built with Isoluminance Line Based Stereo Vision (SL, MK, YS, FT), pp. 2911–2916.
ICPRICPR-v2-2000-LinF #detection #geometry #using
Human Face Detection Using Geometric Triangle Relationship (CL, KCF), pp. 2941–2944.
ICPRICPR-v2-2000-LuoH #algorithm #composition #graph #using
Symbolic Graph Matching Using the EM Algorithm and Singular Value Decomposition (BL, ERH), pp. 2141–2144.
ICPRICPR-v2-2000-MacLeanT #image #pattern matching #pattern recognition #performance #recognition #using
Fast Pattern Recognition Using Gradient-Descent Search in an Image Pyramid (WJM, JKT), pp. 2873–2877.
ICPRICPR-v2-2000-Martinez-HinarejosJC #classification #string
Use of Median String for Classification (CDMH, AJ, FC), pp. 2903–2906.
ICPRICPR-v2-2000-MenardDC #ambiguity #analysis #distance #modelling #using
Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
ICPRICPR-v2-2000-MitaniH #classification #design #nearest neighbour
Classifier Design Based on the Use of Nearest Neighbor Samples (YM, YH), pp. 2769–2772.
ICPRICPR-v2-2000-MiyamotoHM #classification #design #polynomial
Use of Bootstrap Samples in Quadratic Classifier Design (TM, YH, YM), pp. 2789–2792.
ICPRICPR-v2-2000-NgB #classification #segmentation #using
Supervised Texture Segmentation using DWT and a Modified K-NN Classifier (BWN, AB), pp. 2545–2548.
ICPRICPR-v2-2000-PavlovMD #algorithm #using
Scaling-Up Support Vector Machines Using Boosting Algorithm (DP, JM, BD), pp. 2219–2222.
ICPRICPR-v2-2000-PerantonisPV #analysis #classification #component #paradigm #using
Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
ICPRICPR-v2-2000-Ruiz-PinalesL #network #recognition #using
Cursive Handwriting Recognition Using the Hough Transform and a Neural Network (JRP, EL), pp. 2231–2234.
ICPRICPR-v2-2000-Scheunders #image #multi #using
Multispectral Image Fusion Using Local Mapping Techniques (PS), pp. 2311–2314.
ICPRICPR-v2-2000-TanY #convergence #distance #recognition #using
Object Recognition Using Fractal Neighbor Distance: Eventual Convergence and Recognition Rates (TT, HY), pp. 2781–2784.
ICPRICPR-v2-2000-ValvenyM #documentation #framework #recognition #using
Hand-Drawn Symbol Recognition in Graphic Documents Using Deformable Template Matching and a Bayesian Framework (EV, EM), pp. 2239–2242.
ICPRICPR-v2-2000-VillelaA #network #recognition #using
Object Recognition by Indexing Using Neural Networks (PRV, JHSA), pp. 6001–6004.
ICPRICPR-v3-2000-AcharyyaK #segmentation #using
Two Texture Segmentation Using M-Band Wavelet Transform (MA, MKK), pp. 3405–3408.
ICPRICPR-v3-2000-BadenasSP #integration #monitoring #sequence #using
Using Temporal Integration for Tracking Regions in Traffic Monitoring Sequences (JB, JMS, FP), pp. 7137–7140.
ICPRICPR-v3-2000-BaumelaARB #difference #equation #estimation #using
Motion Estimation Using the Differential Epipolar Equation (LB, LdA, IDR, PB), pp. 3848–3851.
ICPRICPR-v3-2000-CarreiraMTH #using
Grouping of Directional Features Using an Extended Hough Transform (MJC, MM, BTT, JFH), pp. 7002–7005.
ICPRICPR-v3-2000-ChantlerM #classification #invariant #on the
On the Use of Gradient Space Eigenvalues for Rotation Invariant Texture Classification (MJC, GM), pp. 3943–3946.
ICPRICPR-v3-2000-ChenHD #composition #using
Circle Location from Intensity and Range Data Using the Singular Value Decomposition (NsC, GH, SD), pp. 3782–3785.
ICPRICPR-v3-2000-ChoKN #image #interface #performance #using
An Efficient Walkthrough from Two Images Using View Morphing and Spidery Mesh Interface (HSC, CHK, SN), pp. 3143–3146.
ICPRICPR-v3-2000-ChoPP #image #segmentation #using
Segmentation of Color Image Using Deterministic Annealing EM (WHC, SYP, JP), pp. 3646–3649.
ICPRICPR-v3-2000-DeMenthonDS #distance #image #markov #modelling #using
Image Distance Using Hidden Markov Models (DD, DSD, MVS), pp. 3147–3150.
ICPRICPR-v3-2000-DemireklerKC #using
Fusing Length and Voicing Information, and HMM Decision Using a Bayesian Causal Tree against Insufficient Training Data (MD, FK, ), pp. 3106–3109.
ICPRICPR-v3-2000-FaruquieMRS #modelling #recognition #scalability #speech #using
Large Vocabulary Audio-Visual Speech Recognition Using Active Shape Models (TAF, AM, NR, LVS), pp. 3110–3113.
ICPRICPR-v3-2000-FrankeKN #fuzzy #image #using
Fuzzy Image Processing by Using Dubois and Prade Fuzzy Norms (KF, MK, BN), pp. 3518–3521.
ICPRICPR-v3-2000-FukuiIIW #analysis #component #using
Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
ICPRICPR-v3-2000-GalambosKM #probability #using
Using Gradient Information to Enhance the Progressive Probabilistic Hough Transform (CG, JK, JM), pp. 3564–3567.
ICPRICPR-v3-2000-GalleaniC #using
Dynamics Using the Wigner Distribution (LG, LC), pp. 3254–3257.
ICPRICPR-v3-2000-GatosM #algorithm #novel #recursion #using
A Novel Recursive Algorithm for Area Location Using Isothetic Polygons (BG, SLM), pp. 3496–3499.
ICPRICPR-v3-2000-GreenbergAKD #image #using
Fingerprint Image Enhancement Using Filtering Techniques (SG, MA, DK, ID), pp. 3326–3329.
ICPRICPR-v3-2000-GrigorescuPK #case study #comparative #distance #using
A Comparative Study of Filter Based Texture Operators Using Mahalanobis Distance (SEG, NP, PK), pp. 3897–3900.
ICPRICPR-v3-2000-HangaiYH #using #verification
Writer Verification Using Altitude and Direction of Pen Movement (SH, SY, TH), pp. 3483–3486.
ICPRICPR-v3-2000-HarukiH #using
Data Fitting by Spline Functions Using the Biorthonormal Basis of the B-spline Basis (RH, TH), pp. 3274–3277.
ICPRICPR-v3-2000-Ichimura #feature model #segmentation #using
Motion Segmentation Using Feature Selection and Subspace Method Based on Shape Space (NI), pp. 3858–3864.
ICPRICPR-v3-2000-Jehan-BessonBA #detection #set #using
Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
ICPRICPR-v3-2000-JeonY #adaptation #image #using
Image Restoration Using Dual Adaptive Regularization Operators (WJ, TY), pp. 3049–3052.
ICPRICPR-v3-2000-JohanssonKG #detection #normalisation #symmetry #using
Detecting Rotational Symmetries Using Normalized Convolution (BJ, HK, GHG), pp. 3500–3504.
ICPRICPR-v3-2000-KeglK #linear #using
Piecewise Linear Skeletonization Using Principal Curves (BK, AK), pp. 3135–3138.
ICPRICPR-v3-2000-Kiema #automation #classification #data fusion #using
Wavelet Compression and Data Fusion: An Investigation into the Automatic Classification of Urban Environments using Color Photography and Laser Scanning Data (JBKK), pp. 3089–3093.
ICPRICPR-v3-2000-KimC #image #network #segmentation #sequence #using
Segmentation of Image Sequences Using SOFM Networks (JK, TC), pp. 3877–3880.
ICPRICPR-v3-2000-KimCL #detection #feature model #performance #using
Fast Scene Change Detection Using Direct Feature Extraction from MPEG Compressed Videos (YMK, SWC, SWL), pp. 3178–3181.
ICPRICPR-v3-2000-KobayakwaHO #correlation #image #retrieval #robust #using
Robust Texture Image Retrieval Using Hierarchical Correlations of Wavelet Coefficients (MK, MH, TO), pp. 3395–3400.
ICPRICPR-v3-2000-KwanCG #approach #automation #bound #using
Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
ICPRICPR-v3-2000-LiapisST #algorithm #performance #segmentation #using
Color and/or Texture Segmentation Using Deterministic Relaxation and Fast Marching Algorithms (SL, ES, GT), pp. 3621–3624.
ICPRICPR-v3-2000-LiuL #clustering #image #using
Wavelet Image Coding Using Cluster Growing Embedding (YL, YDL), pp. 3250–3253.
ICPRICPR-v3-2000-LloretSLSV #image #using
Retinal Image Registration Using Creases as Anatomical Landmarks (DL, JS, AML, AS, JJV), pp. 3207–3210.
ICPRICPR-v3-2000-LuceySC #linear #performance #using
Initialized Eigenlip Estimator for Fast Lip Tracking Using Linear Regression (SL, SS, VC), pp. 3182–3185.
ICPRICPR-v3-2000-LuoT #approach #multi #using
Multi-Level Thresholding: Maximum Entropy Approach Using ICM (XL, JT), pp. 3786–3789.
ICPRICPR-v3-2000-MaedaINTS #algorithm #fuzzy #image #segmentation #using
Rough and Accurate Segmentation of Natural Color Images Using Fuzzy Region-Growing Algorithm (JM, CI, SN, NT, YS), pp. 3642–3645.
ICPRICPR-v3-2000-MiyagawaFA #modelling #using
Texture Modeling by Optimal Gray Scale Structuring Elements Using Morphological Pattern Spectrum (MM, MF, AA), pp. 3479–3482.
ICPRICPR-v3-2000-MullerH #image #invariant #on the
On the Use of SDF-Type Filters for Distortion Invariant Image Location (NM, BMH), pp. 3530–3533.
ICPRICPR-v3-2000-Nakano #using
Classifying the Motions of Human Body by Using Gabor Wavelets (HN), pp. 3691–3694.
ICPRICPR-v3-2000-NaphadeH #framework #probability #semantics #using #video
Semantic Video Indexing Using a Probabilistic Framework (MRN, TSH), pp. 3083–3088.
ICPRICPR-v3-2000-NikolovBCHW #2d #image #multi #using
Fusion of 2-D Images Using Their Multiscale Edges (SGN, DRB, CNC, MH, PNTW), pp. 3045–3048.
ICPRICPR-v3-2000-NodaK #adaptation #identification #probability #using
Adaptive Speaker Identification Using Sequential Probability Ratio Test (HN, EK), pp. 3266–3269.
ICPRICPR-v3-2000-OkataniD00a #estimation #using
Estimation of Illumination Distribution Using a Specular Sphere (TO, KD), pp. 3596–3599.
ICPRICPR-v3-2000-OrriolsTBRVV #approach #detection #modelling #probability #using
Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
ICPRICPR-v3-2000-OrWLL #modelling #segmentation #using #video
Panoramic Video Segmentation Using Color Mixture Models (SHO, KhW, KsL, TkL), pp. 3391–3394.
ICPRICPR-v3-2000-Papamarkos #network #reduction #using
Using Local Features in a Neural Network Based Gray-Level Reduction Technique (NP), pp. 7037–7040.
ICPRICPR-v3-2000-PorterMT #correlation #detection #using #video
Video Cut Detection using Frequency Domain Correlation (SVP, MM, BTT), pp. 3413–3416.
ICPRICPR-v3-2000-RubertoDKJ #image #segmentation #using
Segmentation of Blood Images Using Morphological Operators (CDR, AGD, SK, BJ), pp. 3401–3404.
ICPRICPR-v3-2000-RubertoDKJ00a #automation #image #using
Automatic Thresholding of Infected Blood Images Using Granulometry and Regional Extrema (CDR, AGD, SK, BJ), pp. 3445–3448.
ICPRICPR-v3-2000-SanchisVJ #performance #recognition #speech #verification #word
Efficient Use of the Grammar Scale Factor to Classify Incorrect Words in Speech Recognition Verification (AS, EV, VMJ), pp. 3278–3281.
ICPRICPR-v3-2000-SekimotoNTO #query #retrieval #using #video
Continuous Retrieval of Video Using Segmentation-Free Query (NS, TN, HT, RO), pp. 3375–3378.
ICPRICPR-v3-2000-ShojiMT #2d #estimation #using
Pose Estimation of a 2-D Articulated Object from Its Silhouette Using a GA (KS, AM, FT), pp. 3717–3721.
ICPRICPR-v3-2000-VincentCF #3d #segmentation #tool support #using
Spatio-Temporal Segmentation Using 3D Morphological Tools (VA, CR, FH), pp. 3885–3892.
ICPRICPR-v3-2000-WilkinsonRDB #analysis #using
Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
ICPRICPR-v3-2000-WinkNV #heuristic #using
Minimum Cost Path Determination Using a Simple Heuristic Function (OW, WJN, MAV), pp. 7010–7013.
ICPRICPR-v3-2000-YamanaSA #detection #image #reliability #using
Edge Plane Detection in Spatio-Temporal Images by Using Edge Vector and Edge Reliability (FY, TS, KA), pp. 3664–3667.
ICPRICPR-v3-2000-YamazawaYY #3d #re-engineering #using
3D Line Segment Reconstruction by Using HyperOmni Vision and Omnidirectional Hough Transforming (KY, YY, MY), pp. 3487–3490.
ICPRICPR-v3-2000-ZhaMH #data type #multi #using
Dynamic Control of Mesh LODs (Levels of Detail) by Using a Multiresolution Mesh Data Structure (HZ, YM, TH), pp. 3505–3509.
ICPRICPR-v3-2000-ZhangGST #adaptation #analysis #modelling #using
Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
ICPRICPR-v3-2000-ZhangWZ #using
Simultaneously Recovering Affine Motion and Defocus Blur Using Moments (YZ, CW, YZ), pp. 3881–3884.
ICPRICPR-v4-2000-AdamRS #locality #modelling #navigation #using
Using Model-Based Localization with Active Navigation (AA, ER, IS), pp. 4676–4680.
ICPRICPR-v4-2000-AlbiolNM #people #realtime #tool support #using
Real-Time High Density People Counter Using Morphological Tools (AA, VN, IM), pp. 4652–4655.
ICPRICPR-v4-2000-BareaBMLB #network #using
E.O.G. Guidance of a Wheelchair Using Neural Networks (RB, LB, MM, ELG, LMB), pp. 4668–4671.
ICPRICPR-v4-2000-BodnarovaBL #detection #using
Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
ICPRICPR-v4-2000-Egmont-PetersenFNHBVR #image #multi #network #segmentation #using
Segmentation of Bone Tumor in MR Perfusion Images Using Neural Networks and Multiscale Pharmacokinetic Features (MEP, AFF, WJN, PCWH, JLB, MAV, JHCR), pp. 4080–4083.
ICPRICPR-v4-2000-FabletB #statistics #using
Statistical Motion-Based Object Indexing Using Optic Flow Field (RF, PB), pp. 4287–4290.
ICPRICPR-v4-2000-FolkersSS #multi #query #using
Processing Pictorial Queries with Multiple Instances Using Isomorphic Subgraphs (AF, HS, AS), pp. 4051–4054.
ICPRICPR-v4-2000-Ishii #3d #metric #using
3-D Shape Measurement Using a Focused-Section Method (AI), pp. 4828–4832.
ICPRICPR-v4-2000-JabriDWR #adaptation #detection #image #people #using #video
Detection and Location of People in Video Images Using Adaptive Fusion of Color and Edge Information (SJ, ZD, HW, AR), pp. 4627–4631.
ICPRICPR-v4-2000-JoganL #locality #recognition #robust #using
Robust Localization Using Panoramic View-Based Recognition (MJ, AL), pp. 4136–4139.
ICPRICPR-v4-2000-KhorsheedC #multi #recognition #using #word
Multi-Font Arabic Word Recognition Using Spectral Features (MSK, WFC), pp. 4543–4546.
ICPRICPR-v4-2000-KimYL #using
A Control Model for Vergence Movement on a Stereo Robotic Head Using Disparity Flux (HJK, MHY, SWL), pp. 4491–4494.
ICPRICPR-v4-2000-KoLB #feature model #image #performance #retrieval #using
Region-Based Image Retrieval System Using Efficient Feature Description (BK, HSL, HB), pp. 4283–4286.
ICPRICPR-v4-2000-Leavers #analysis #using
Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
ICPRICPR-v4-2000-MadabhushiA #process #using
Using Head Movement to Recognize Activity (AM, JKA), pp. 4698–4701.
ICPRICPR-v4-2000-MaderlechnerSS #documentation #image #metric #using #visual notation
Extraction of Relevant Information from Document Images Using Measures of Visual Attention (GM, AS, PS), pp. 4385–4388.
ICPRICPR-v4-2000-MaeUAI #modelling #recognition #using
Object Recognition using Appearance Models Accumulated into Environment (YM, TU, TA, KI), pp. 4845–4848.
ICPRICPR-v4-2000-MamicB #automation #detection #using
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
ICPRICPR-v4-2000-MataNS #detection #multi #using
Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
ICPRICPR-v4-2000-OhishiKM #online #using #verification
On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
ICPRICPR-v4-2000-OmachiIA #image #multi #using
Structure Extraction from Various Kinds of Decorated Characters Using Multi-Scale Images (SO, MI, HA), pp. 4455–4458.
ICPRICPR-v4-2000-OnishiIF00a #image #segmentation #using #video
Blackboard Segmentation Using Video Image of Lecture and Its Applications (MO, MI, KF), pp. 4615–4618.
ICPRICPR-v4-2000-RohKL #modelling #multi #people #using
Multiple People Tracking Using an Appearance Model Based on Temporal Color (HKR, SK, SWL), pp. 4643–4646.
ICPRICPR-v4-2000-SanchezM00a #behaviour #programming #using #visual notation
Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
ICPRICPR-v4-2000-ShimamuraTYY #image #modelling #using
Construction and Presentation of a Virtual Environment Using Panoramic Stereo Images of a Real Scene and Computer Graphics Models (JS, HT, NY, KY), pp. 4463–4467.
ICPRICPR-v4-2000-ShiranitaHOT #image #metric #sketching #using
Shape Measurement and Sketching Systems for Porcelain Using Image Technology (KS, KH, AO, RT), pp. 4795–4798.
ICPRICPR-v4-2000-StofflerBF #realtime #using
Real-Time Obstacle Avoidance Using an MPEG-Processor-Based Optic Flow Sensor (NOS, TB, GF), pp. 4161–4166.
ICPRICPR-v4-2000-SziranyiC #optimisation #parallel #segmentation #using
Spatio-Temporal Segmentation with Edge Relaxation and Optimization Using Fully Parallel Methods (TS, LC), pp. 4820–4823.
ICPRICPR-v4-2000-TakahashiKIS #image #using
Expanding Possible View Points of Virtual Environment Using Panoramic Images (TT, HK, KI, MS), pp. 4468–4472.
ICPRICPR-v4-2000-TakahashiSO #3d #estimation #image #realtime #using
Remarks on a Real-Time 3D Human Body Posture Estimation Method Using Trinocular Images (KT, TS, JO), pp. 4693–4697.
ICPRICPR-v4-2000-UtsumiYO #adaptation #multi #using
Adaptive Human Motion Tracking Using Non-Synchronous Multiple Viewpoint Observations (AU, HY, JO), pp. 4607–4610.
ICPRICPR-v4-2000-VinczeAZ #integration #performance #using
Fast Tracking of Ellipses Using Edge-Projected Integration of Cues (MV, MA, MZ), pp. 4072–4075.
ICPRICPR-v4-2000-WakaharaK #correlation #invariant #recognition #using
Affine-Invariant Gray-Scale Character Recognition Using GAT Correlation (TW, YK), pp. 4417–4421.
ICPRICPR-v4-2000-WolfKBJ #image #retrieval #using
Content Based Image Retrieval Using Interest Points and Texture Features (CW, WGK, HB, JMJ), pp. 4234–4237.
ICPRICPR-v4-2000-YamaguchiTYY #generative #image #realtime #sequence #using
Real-Time Generation and Presentation of View-Dependent Binocular Stereo Images Using a Sequence of Omnidirectional Images (KY, HT, KY, NY), pp. 4589–4593.
ICPRICPR-v4-2000-YamanyF #3d #recognition #using
3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
KDDKDD-2000-BarbaraC #clustering #dataset #using
Using the fractal dimension to cluster datasets (DB, PC), pp. 260–264.
KDDKDD-2000-Buchanan #information management #source code #using
Informed knowledge discovery: using prior knowledge in discovery programs (invited talk, abstract only) (BGB), p. 3.
KDDKDD-2000-CadezHMSW #clustering #modelling #navigation #using #visualisation #web
Visualization of navigation patterns on a Web site using model-based clustering (IVC, DH, CM, PS, SW), pp. 280–284.
KDDKDD-2000-IyengarAZ #adaptation #learning #using
Active learning using adaptive resampling (VSI, CA, TZ), pp. 91–98.
KDDKDD-2000-KingKCD #data mining #functional #mining #predict #sequence #using
Genome scale prediction of protein functional class from sequence using data mining (RDK, AK, AC, LD), pp. 384–389.
KDDKDD-2000-MaLWYL #data mining #mining #student #using
Targeting the right students using data mining (YM, BL, CKW, PSY, SML), pp. 457–464.
KDDKDD-2000-PavlovCS #scalability #towards #using
Towards scalable support vector machines using squashing (DP, DC, PS), pp. 295–299.
KDDKDD-2000-RaghavanBS #detection #predict #process #using
Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
KDDKDD-2000-Senator #case study #detection #information management #scalability
Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation’s Advanced Detection System (RADS) (TES), pp. 44–53.
KDDKDD-2000-YamanishiTWM #algorithm #detection #finite #learning #online #using
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms (KY, JiT, GJW, PM), pp. 320–324.
KRKR-2000-BaaderKM #concept #using
Rewriting Concepts Using Terminologies (FB, RK, RM), pp. 297–308.
KRKR-2000-BaralMS #problem #using
Formulating diagnostic problem solving using an action language with narratives and sensing (CB, SAM, TCS), pp. 311–322.
KRKR-2000-MartinG #concept #learning #policy #using
Learning Generalized Policies in Planning Using Concept Languages (MM, HG), pp. 667–677.
KRKR-2000-VerberneHT #approximate #constraints #reasoning #using
Anytime Diagnostic Reasoning using Approximate Boolean Constraint Propagation (AV, FvH, AtT), pp. 323–332.
KRKR-2000-Voronkov #using
Deciding K using inverse-K (AV), pp. 198–209.
SIGIRSIGIR-2000-HoashiMIH #documentation #using
Document filtering method using non-relevant information profile (KH, KM, NI, KH), pp. 176–183.
SIGIRSIGIR-2000-HoenkamG #proximity #using
Finding relevant passages using noun-noun compounds: coherence vs. proximity (EH, RdG), pp. 385–387.
SIGIRSIGIR-2000-ManevitzY #classification #documentation #network #using
Document classification on neural networks using only positive examples (LMM, MY), pp. 304–306.
SIGIRSIGIR-2000-NaritaO #information retrieval #query
The use of phrases from query texts in information retrieval (MN, YO), pp. 318–320.
SIGIRSIGIR-2000-OhML #categorisation #hypermedia #incremental #using
A practical hypertext categorization method using links and incrementally available class information (HJO, SHM, MHL), pp. 264–271.
SIGIRSIGIR-2000-Ounis #image #ranking #using
Ranking digital images using combination if evidences (IO), pp. 348–350.
SIGIRSIGIR-2000-SlonimT #clustering #documentation #using #word
Document clustering using word clusters via the information bottleneck method (NS, NT), pp. 208–215.
UMLUML-2000-AbdurazikO #collaboration #diagrams #generative #static analysis #testing #uml #using
Using UML Collaboration Diagrams for Static Checking and Test Generation (AA, AJO), pp. 383–395.
UMLUML-2000-AmyotM #case study #concept #on the #uml
On the Extension of UML with Use Case Maps Concepts (DA, GM), pp. 16–31.
UMLUML-2000-GraubmannR #case study #diagrams #modelling #sequence chart #testing
HyperMSCs and Sequence Diagrams for Use Case Modelling and Testing (PG, ER), pp. 32–46.
UMLUML-2000-SendallS #case study #specification
From Use Cases to System Operation Specifications (SS, AS), pp. 1–15.
UMLUML-2000-WegmannG #case study #diagrams
The Roles of “Roles” in Use Case Diagrams (AW, GG), pp. 210–224.
ECOOPECOOP-2000-Cochinwala #communication #generative #using
Using Objects for Next Generation Communication Services (MC), pp. 388–393.
OOPSLAOOPSLA-2000-MaessenAS #java #memory management #using
Improving the Java memory model using CRF (JWM, A, XS), pp. 1–12.
TOOLSTOOLS-ASIA-2000-LiCC00a #component #e-commerce #using
Developing an E-Commerce Application by Using Content Component Model (QL, PC, JC), pp. 275–284.
TOOLSTOOLS-ASIA-2000-LinaLX #java #using
An Agent-Based Load Balancing Mechanism: PLRM Using Java (LL, LL, YX), pp. 176–181.
TOOLSTOOLS-ASIA-2000-NewmarchSM #enterprise #using #web
Using the Web and Jini to link Vending Machines and Enterprise Systems (JN, KS, CM), pp. 260–264.
TOOLSTOOLS-ASIA-2000-Wang #automation #flexibility #object-oriented #using
Using Object-Orientation in Developing a Flexible Automatic Test System (LW), pp. 65–72.
TOOLSTOOLS-ASIA-2000-ZhangW #design pattern #implementation #object-oriented #undo #using
Implementing Undo/Redo in PDF Studio Using Object-Oriented Design Pattern (MZ, KW), pp. 58–64.
TOOLSTOOLS-ASIA-2000-ZhouC #design #multi #repository #using
Design Consideration Using the Multimedia Object Repository (BZ, GC), pp. 81–87.
TOOLSTOOLS-EUROPE-2000-DammHTT #case study #component #experience #integration #tool support #using #xmi
Tool Integration: Experiences and Issues in Using XMI and Component Technology (CHD, KMH, MT, MT), pp. 94–107.
TOOLSTOOLS-EUROPE-2000-DuvalP #design pattern #interactive #kernel #object-oriented #using
Using the PAC-Amodeus Model and Design Patterns to Make Interactive an Existing Object-Oriented Kernel (TD, FP), pp. 407–418.
TOOLSTOOLS-EUROPE-2000-Graham #case study #generative #requirements
Requirements Engineering: Use Cases Are from Mars, Generative Languages are from Venus (IMG), p. 4.
TOOLSTOOLS-PACIFIC-2000-BornHK #design #development #distributed #uml #using
A Method for the Design and Development of Distributed Applications Using UML (MB, EH, OK), pp. 253–265.
TOOLSTOOLS-PACIFIC-2000-Moisiadis #case study
Prioritising Use Cases and Scenarios (FM), pp. 108–119.
TOOLSTOOLS-USA-2000-Adolph #case study #pattern matching
The Use Case Pattern Language (SA), pp. 459–460.
TOOLSTOOLS-USA-2000-BirngruberH #set #specification #using
Using Plans for Specifying Preconfigured Bean Sets (DB, MH), pp. 217–226.
TOOLSTOOLS-USA-2000-Langer00a #c++ #implementation #using
Using C++ Templates for Implementation of Patterns (AL), pp. 485–486.
TOOLSTOOLS-USA-2000-McDavid #framework #semantics #using
A Framework for Discovering, Organizing, and Using Business Semantics (DM), pp. 549–554.
TOOLSTOOLS-USA-2000-PulvermullerSR #aspect-oriented #design #implementation #programming #using
Implementing Collaboration-Based Designs Using Aspect-Oriented Programming (EP, AS, AR), pp. 95–104.
PPDPPPDP-2000-KollerM #abstract interpretation #component #morphism #performance #using
Efficient abstract interpretation using component-wise homomorphisms (JK, MM), pp. 226–234.
PPDPPPDP-2000-RoychoudhuryRR #proving #using
Justifying proofs using memo tables (AR, CRR, IVR), pp. 178–189.
PADLPADL-2000-MarinoM #functional #logic programming #source code #static analysis #using
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), pp. 63–80.
REICRE-2000-BaumBGM #component #design #requirements #reuse #using
Mapping Requirements to Reusable Components Using Design Spaces (LB, MB, LG, GM), pp. 159–167.
REICRE-2000-HorlA #communication #requirements #validation
Requirements Validation of a Voice Communication System Used in Air Traffic Control (JH, BKA), p. 190.
REICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process #using
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
REICRE-2000-Saeki #aspect-oriented #case study #reuse
Patterns and Aspects for Use Cases: Reuse Techniques for Use Case Descriptions (MS), p. 62.
SACSAC-2000-AlhamedL #analysis #approach #clustering #multi #using
A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
SACSAC-2000-BojicV #case study #reverse engineering #uml
Reverse Engineering of Use Case Realizations in UML (DB, DMV), pp. 741–747.
SACSAC-2000-BonfigliCS #adaptation #hypermedia #using #xml
Adaptive Intelligent Hypermedia using XML (MEB, GC, PS), pp. 922–926.
SACSAC-2000-BougeMNP #architecture #case study #distributed #parallel #runtime #thread #using
Using the VI Architecture to Build Distributed, Multithreaded Runtime Systems: A Case Study (LB, JFM, RN, LP), pp. 704–709.
SACSAC-2000-BoujarwahSA #analysis #data flow #java #source code #testing #using
Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
SACSAC-2000-ByunL #classification #using
Form Classification Using DP Matching (YB, YL), pp. 1–4.
SACSAC-2000-FeekinC #detection #sorting #using
Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
SACSAC-2000-HaratyF #distributed #optimisation #query #using
Distributed Query Optimization Using PERF Joins (RAH, RCF), pp. 284–288.
SACSAC-2000-JurisicaG #image #reasoning #using
Extending Case-Based Reasoning by Discovering and Using Image Features in IVF (IJ, JIG), pp. 52–59.
SACSAC-2000-Khalili #assembly #using
Using Pads Instead of Fiducial Marks in Vision Assisted Assembly of PCB’s (KK), pp. 5–9.
SACSAC-2000-KirnerM #artificial reality #development #using #visualisation
Development of an Information Visualization Tool Using Virtual Reality (TGK, VFMS), pp. 604–606.
SACSAC-2000-KoLB #flexibility #image #retrieval #using
Image Retrieval Using Flexible Image Subblocks (BK, HSL, HB), pp. 574–578.
SACSAC-2000-LeeKHL #dependence #graph #scheduling #using
Task Scheduling using a Block Dependency DAG for Block-Oriented Sparse Cholesky Factorization (HL, JK, SJH, SL), pp. 641–648.
SACSAC-2000-OchKO #data flow #semistructured data #using
Integrating Heterogeneous Data Sources Using the COIL Mediator Definition Language (CO, RK, RO), pp. 991–1000.
SACSAC-2000-Reich #algorithm #difference #equation #simulation #using
Simulation of Imprecise Ordinary Differential Equations Using Evolutionary Algorithms (CR), pp. 428–432.
SACSAC-2000-RudraG #adaptation #clustering #problem
Adaptive Use of a Cluster of PCs for Data Warehousing Applications: Some Problems and Issues (AR, RPG), pp. 698–703.
SACSAC-2000-SchreckC #implementation #using
R-Tree Implementation Using Branch-Grafting Method (TS, ZC), pp. 328–332.
SACSAC-2000-Tellioglu #architecture #using #web
Cooperative Planning: Using the Web for Cooperation in Architectural Planning (HT), pp. 1001–1005.
SACSAC-2000-TryfonaJ #abstraction #concept #modelling #using
Using Abstractions for Spatio-Temporal Conceptual Modeling (NT, CSJ), pp. 313–322.
SACSAC-2000-ZhangP #distributed #network #query #using
Distributed Query Processing Using Active Networks (ZZ, WP), pp. 374–380.
FSEFSE-2000-HollingsworthBW #case study #experience #using
Experience report: using RESOLVE/C++ for commercial software (JEH, LB, BWW), pp. 11–19.
ICSEICSE-2000-BasiliLSR #tutorial #using
Improving software inspections by using reading techniques (tutorial session) (VRB, OL, FS, IR), p. 836.
ICSEICSE-2000-Bevan #quality #specification #tutorial
Specifying and measuring quality in use (tutorial session) (NB), p. 819.
ICSEICSE-2000-KautzHT #enterprise #process
Applying and adjusting a software process improvement model in practice: the use of the IDEAL model in a small software enterprise (KK, HWH, KT), pp. 626–633.
ICSEICSE-2000-KazmanK #architecture #design #tutorial #using
Designing and analyzing software architectures using ABASs (tutorial session) (RK, MK), p. 820.
ICSEICSE-2000-LippertL #aspect-oriented #case study #detection #exception #programming #using
A study on exception detecton and handling using aspect-oriented programming (ML, CVL), pp. 418–427.
ICSEICSE-2000-LopesK #aspectj #composition #design #source code #tutorial #using
Improving design and source code modularity using AspectJ (tutorial session) (CVL, GK), p. 825.
ICSEICSE-2000-Michail #data mining #library #mining #reuse #using
Data mining library reuse patterns using generalized association rules (AM), pp. 167–176.
ICSEICSE-2000-Moore #education #lessons learnt #re-engineering #tool support #using
Lessons learned from teaching reflective software engineering using the Leap toolkit (CAM), pp. 672–675.
ICSEICSE-2000-NordPS #architecture #tutorial #using
Planning realistic schedules using software architecture (tutorial session) (RLN, DJP, DS), p. 824.
ICSEICSE-2000-Pisan #specification #using
Extending requirement specifications using analogy (YP), pp. 70–76.
ICSEICSE-2000-Rausch #component #contract #evolution #requirements #using
Software evolution in componentware using requirements/assurances contracts (AR), pp. 147–156.
ICSEICSE-2000-TakahashiEFG #development #tutorial #using
System development using application services over the Net (tutorial session) (KT, WE, AF, SG), p. 830.
ASPLOSASPLOS-2000-ChouCEH #compilation #protocol #using
Using Meta-level Compilation to Check FLASH Protocol Code (AC, BC, DRE, MH), pp. 59–70.
CCCC-2000-RyderSKGS #exception #java #using
A Static Study of Java Exceptions Using JESP (BGR, DS, UK, MG, NS), pp. 67–81.
CCCC-2000-Vallee-RaiGHLPS #bytecode #framework #java #optimisation #question #using
Optimizing Java Bytecode Using the Soot Framework: Is It Feasible? (RVR, EG, LJH, PL, PP, VS), pp. 18–34.
HPCAHPCA-2000-BoschSSRH #analysis #case study #parallel #performance #using #visualisation
Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
HPCAHPCA-2000-MowryR #memory management #multi #thread #using
Software-Controlled Multithreading Using Informing Memory Operations (TCM, SRR), pp. 121–132.
HPDCHPDC-2000-GouacheP #corba #industrial #simulation #using
Coupling of Industrial Simulation Codes using CORBA (SG, TP), pp. 312–314.
HPDCHPDC-2000-PlaleS #data flow #embedded #named #query #scalability #using
dQUOB: Managing Large Data Flows using Dynamic Embedded Queries (BP, KS), pp. 263–270.
HPDCHPDC-2000-SumimotoTHHTI #clustering #communication #network #performance #using
High Performance Communication using a Commodity Network for Cluster Systems (SS, HT, AH, HH, TT, YI), pp. 139–146.
HPDCHPDC-2000-TurgeonSC #performance #using
Application Placement using Performance Surfaces (AT, QS, MJC), pp. 229–236.
HPDCHPDC-2000-WangOCF #predict #using
Using Idle Workstations to Implement Predictive Prefetching (JYQW, JSO, YC, MJF), pp. 87–94.
ISMMISMM-2000-HeilS #concurrent #garbage collection #profiling
Concurrent Garbage Collection UsingHardware-Assisted Profiling (THH, JES), pp. 80–93.
ISMMISMM-2000-PlakalF #concurrent #garbage collection #parallel #slicing #thread #using
Concurrent Garbage Collection Using Program Slices on Multithreaded Processors (MP, CNF), pp. 94–100.
LCTESLCTES-2000-CintraA #array #using
Array Reference Allocation Using SSA-Form and Live Range Growth (MSC, GA), pp. 48–62.
LCTESLCTES-2000-JeongKL #concurrent #multi #realtime #using
Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version (BSJ, DK, SL), pp. 33–47.
OSDIOSDI-2000-BrownM #memory management #physics #using
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently (ADB, TCM), pp. 31–44.
OSDIOSDI-2000-EnglerCCH #compilation #using
Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions (DRE, BC, AC, SH), pp. 1–16.
CADECADE-2000-AndrewsB #education #higher-order #logic #named #proving #theorem proving #tutorial #using
Tutorial: Using TPS for Higher-Order Theorem Proving and ETPS for Teaching Logic (PBA, CEB), pp. 511–512.
CADECADE-2000-BezemHN #automation #proving #type system #using
Automated Proof Construction in Type Theory Using Resolution (MB, DH, HdN), pp. 148–163.
CADECADE-2000-Harrison #proving #theorem proving #using #verification
High-Level Verification Using Theorem Proving and Formalized Mathematics (JH), pp. 1–6.
CADECADE-2000-HasegawaFK #branch #generative #performance #using
Efficient Minimal Model Generation Using Branching Lemmas (RH, HF, MK), pp. 184–199.
CAVCAV-2000-StollerUL #detection #distributed #partial order #performance #using
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
ICLPCL-2000-AllainY #database #specification #using
Specification of an Active Database System Application Using Dynamic Relation Nets (LA, PY), pp. 1197–1209.
ICLPCL-2000-BastidePTSL #mining #using
Mining Minimal Non-redundant Association Rules Using Frequent Closed Itemsets (YB, NP, RT, GS, LL), pp. 972–986.
ICLPCL-2000-HolldoblerS #calculus #diagrams #problem #using
Solving the Entailment Problem in the Fluent Calculus Using Binary Decision Diagrams (SH, HPS), pp. 747–761.
ICLPCL-2000-KozenP #algebra #certification #compilation #optimisation #testing #using
Certification of Compiler Optimizations Using Kleene Algebra with Tests (DK, MCP), pp. 568–582.
ICLPCL-2000-PearceGV #equilibrium #modelling #using
Computing Equilibrium Models Using Signed Formulas (DP, IPdG, AV), pp. 688–702.
ICLPCL-2000-YangK #implementation #logic #named #performance #using
FLORA: Implementing an Efficient DOOD System Using a Tabling Logic Engine (GY, MK), pp. 1078–1093.
ISSTAISSTA-2000-HindP #analysis #pointer #question
Which pointer analysis should I use? (MH, AP), pp. 113–123.
ISSTAISSTA-2000-SchroederK #analysis #black box #reduction #using
Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
ICTSSTestCom-2000-CavalliPY #communication #detection #fault #power of #testing
Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs (ARC, SP, NY), p. 35–?.
ICTSSTestCom-2000-HorvathM #functional #testing #using
Functional Testing GPRS Support Nodes Using TTCN (EH, AM), pp. 229–238.
ICTSSTestCom-2000-MednonogovKMM #consistency #corba #testing #using
Conformance Testing of CORBA Services Using TTCN (AM, HK, OM, JM), p. 193–?.
ICTSSTestCom-2000-RyuKKS #design #generative #testing #using
Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques (JR, MK, SK, SS), pp. 127–142.
WICSAWICSA-1999-RiegelKS #architecture #modelling #using
Modeling Software Architecture Using Domain-Specific Patterns (JPR, CK, MS), pp. 273–292.
WICSAWICSA-1999-SaridakisI #architecture #using
Developing Dependable Systems Using Software Architecture (TS, VI), pp. 83–104.
ASEASE-1999-Bose #architecture #automation #modelling #simulation #uml #using #verification
Automated Translation of UML Models of Architectures for Verification and Simulation Using SPIN (PKB), pp. 102–109.
ASEASE-1999-Krustev #generative #refinement #testing #using
Software Test Generation Using Refinement Types (DNK), pp. 279–282.
ASEASE-1999-MartinsD #approach #elicitation #process #requirements #using
An Approach to Software Requirements Elicitation Using the Precepts from Activity Theory (LEGM, BMD), pp. 15–23.
ASEASE-1999-WatersRA #architecture #concept analysis #using
Architectural Element Matching Using Concept Analysis (RW, SR, GDA), pp. 291–294.
ASEASE-1999-WeltyF #architecture #documentation #ontology
A Formal Ontology for Re-Use of Software Architecture Documents (CAW, DAF), pp. 259–262.
DACDAC-1999-AbramoviciSS #configuration management #hardware #satisfiability #using
A Massively-Parallel Easily-Scalable Satisfiability Solver Using Reconfigurable Hardware (MA, JTdS, DGS), pp. 684–690.
DACDAC-1999-AbtsR #multi #scalability #using #verification
Verifying Large-Scale Multiprocessors Using an Abstract Verification Environment (DA, MR), pp. 163–168.
DACDAC-1999-BalasaL #layout #representation #using
Module Placement for Analog Layout Using the Sequence-Pair Representation (FB, KL), pp. 274–279.
DACDAC-1999-BiereCCFZ #model checking #satisfiability #using
Symbolic Model Checking Using SAT Procedures instead of BDDs (AB, AC, EMC, MF, YZ), pp. 317–320.
DACDAC-1999-ChangLPK #using #verification
Verification of a Microprocessor Using Real World Applications (YSC, SL, ICP, CMK), pp. 181–184.
DACDAC-1999-ChenM #using
Noise-Aware Repeater Insertion and Wire-Sizing for On-Chip Interconnect Using Hierarchical Moment-Matching (CPC, NM), pp. 502–506.
DACDAC-1999-ConnEMOSVW #optimisation #using
Gradient-Based Optimization of Custom Circuits Using a Static-Timing Formulation (ARC, IME, WWM, PRO, PNS, CV, CBW), pp. 452–459.
DACDAC-1999-DoboliNDGV #behaviour #design #synthesis #using
Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
DACDAC-1999-DrechslerG #bound #using
Using Lower Bounds During Dynamic BDD Minimization (RD, WG), pp. 29–32.
DACDAC-1999-ErcegovacKP #behaviour #multi #optimisation #power management #precise #synthesis #using
Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic (MDE, DK, MP), pp. 568–573.
DACDAC-1999-GovindarajuDB #approximate #reachability #using
Improved Approximate Reachability Using Auxiliary State Variables (SGG, DLD, JPB), pp. 312–316.
DACDAC-1999-GunupudiN #using
Model-Reduction of Nonlinear Circuits Using Krylov-Space Techniques (PKG, MSN), pp. 13–16.
DACDAC-1999-GuoRP #generative #named #using
Proptest: A Property Based Test Pattern Generator for Sequential Circuits Using Test Compaction (RG, SMR, IP), pp. 653–659.
DACDAC-1999-HemaniMKPONOEL #design #power management #using
Lowering Power Consumption in Clock by Using Globally Asynchronous Locally Synchronous Design Style (AH, TM, SK, AP, TO, PN, , PE, DL), pp. 873–878.
DACDAC-1999-JiangV #energy #using
IC Test Using the Energy Consumption Ratio (WJ, BV), pp. 976–981.
DACDAC-1999-JohnsonSR #performance
Leakage Control with Efficient Use of Transistor Stacks in Single Threshold CMOS (MCJ, DS, KR), pp. 442–445.
DACDAC-1999-KapadiaH #automation #clustering #convergence #design #standard #using
Using Partitioning to Help Convergence in the Standard-Cell Design Automation Methodology (HK, MH), pp. 592–597.
DACDAC-1999-SalekLP #generative #independence #named #using
MERLIN: Semi-Order-Independent Hierarchical Buffered Routing Tree Generation Using Local Neighborhood Search (AHS, JL, MP), pp. 472–478.
DACDAC-1999-SaxenaL #using
Crosstalk Minimization Using Wire Perturbations (PS, CLL), pp. 100–103.
DACDAC-1999-SgroiL #embedded #petri net #synthesis #using
Synthesis of Embedded Software Using Free-Choice Petri Nets (MS, LL), pp. 805–810.
DACDAC-1999-Sheehan #equation #named #order #performance #reduction #using
ENOR: Model Order Reduction of RLC Circuits Using Nodal Equations for Efficient Factorization (BNS), pp. 17–21.
DACDAC-1999-StepnerRH #design #embedded #realtime #using
Embedded Application Design Using a Real-Time OS (DS, NR, DH), pp. 151–156.
DACDAC-1999-SundararajanP #power management #synthesis #using
Synthesis of Low Power CMOS VLSI Circuits Using Dual Supply Voltages (VS, KKP), pp. 72–75.
DACDAC-1999-TsaiCB #quality #using
Improving the Test Quality for Scan-Based BIST Using a General Test Application Scheme (HCT, KTC, SB), pp. 748–753.
DACDAC-1999-TupuriKA #automation #constraints #functional #generative #testing #using
Test Generation for Gigahertz Processors Using an Automatic Functional Constraint Extractor (RST, AK, JAA), pp. 647–652.
DACDAC-1999-VandecappelleMBCV #design #feedback #memory management #multi #using
Global Multimedia System Design Exploration Using Accurate Memory Organization Feedback (AV, MM, EB, FC, DV), pp. 327–332.
DACDAC-1999-YehKSW #design #layout
Layout Techniques Supporting the Use of Dual Supply Voltages for Cell-based Designs (CWY, YSK, SJS, JSW), pp. 62–67.
DATEDATE-1999-BreuerMBFLK #reasoning #semantics #using
Reasoning about VHDL and VHDL-AMS using Denotational Semantics (PTB, NMM, JPB, RBF, MMLP, CDK), pp. 346–352.
DATEDATE-1999-BuhlerPKB #approach #performance #process #simulation #using
Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
DATEDATE-1999-ChangP #co-evolution #communication #design #named #programming #using
Codex-dp: Co-design of Communicating Systems Using Dynamic Programming (JMC, MP), p. 568–?.
DATEDATE-1999-CherubalC #fault #functional #parametricity #using
Parametric Fault Diagnosis for Analog Systems Using Functional Mapping (SC, AC), p. 195–?.
DATEDATE-1999-CotaCL #adaptation #fault #linear #using
A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester (ÉFC, LC, ML), pp. 184–188.
DATEDATE-1999-DhanwadaNV #constraints #synthesis #using
Hierarchical Constraint Transformation Using Directed Interval Search for Analog System Synthesis (NRD, ANA, RV), p. 328–?.
DATEDATE-1999-FournierAL #functional #product line #using #verification
Functional Verification Methodology for Microprocessors Using the Genesys Test-Program Generator-Application to the x86 Microprocessors Family (LF, YA, ML), pp. 434–441.
DATEDATE-1999-GomesC #testing #using
Minimal Length Diagnostic Tests for Analog Circuits using Test History (AVG, AC), pp. 189–194.
DATEDATE-1999-Holzheuer #analysis #how #process
How to use Knowledge in an Analysis Process (HH), pp. 498–502.
DATEDATE-1999-HongB #analysis #finite #reachability #scalability #state machine #using
Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
DATEDATE-1999-Hsiao #estimation #optimisation #scalability #search-based #using
Peak Power Estimation Using Genetic Spot Optimization for Large VLSI Circuits (MSH), p. 175–?.
DATEDATE-1999-Kuchcinski #constraints #finite #graph #scheduling #using
Integrated Resource Assignment and Scheduling of Task Graphs Using Finite Domain Constraints (KK), pp. 772–773.
DATEDATE-1999-Marques-SilvaG #equivalence #learning #recursion #satisfiability #using
Combinational Equivalence Checking Using Satisfiability and Recursive Learning (JPMS, TG), pp. 145–149.
DATEDATE-1999-MartinezAQH #algorithm #encoding #using
An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length (MM, MJA, JMQ, JLH), pp. 521–525.
DATEDATE-1999-Montiel-NelsonNASN #design #logic #using
High Speed GaAs Subsystem Design using Feed Through Logic (JAMN, SN, VdA, RS, AN), p. 509–?.
DATEDATE-1999-RaikU #diagrams #generative #modelling #testing #using
Sequential Circuit Test Generation Using Decision Diagram Models (JR, RU), pp. 736–740.
DATEDATE-1999-RanjanSSB #using #verification
Using Combinational Verification for Sequential Circuits (RKR, VS, FS, RKB), pp. 138–144.
DATEDATE-1999-SantosoMRA #generative #named #testing #using
FreezeFrame: Compact Test Generation Using a Frozen Clock Strategy (YS, MCM, EMR, MA), p. 747–?.
DATEDATE-1999-SantosT #fault #simulation #using
Defect-Oriented Mixed-Level Fault Simulation of Digital Systems-on-a-Chip Using HDL (MBS, JPT), p. 549–?.
DATEDATE-1999-Sheehan #reduction #using
Projective Convolution: RLC Model-Order Reduction Using the Impulse Response (BNS), p. 669–?.
DATEDATE-1999-TabbaraSSFL #modelling #performance #using
Fast Hardware-Software Co-simulation Using VHDL Models (BT, MS, ALSV, EF, LL), p. 309–?.
DATEDATE-1999-TanS #diagrams #scalability #using
Interpretable Symbolic Small-Signal Characterization of Large Analog Circuits using Determinant Decision Diagrams (XDT, CJRS), pp. 448–453.
DATEDATE-1999-ThorntonWDD #diagrams #order #using
Variable Reordering for Shared Binary Decision Diagrams Using Output Probabilities (MAT, JPW, RD, ND), pp. 758–759.
DATEDATE-1999-WeissSR #embedded #operating system #performance #realtime #using
Emulation of a Fast Reactive Embedded System using a Real Time Operating System (KW, TS, WR), pp. 764–765.
HTHT-1999-AuffretCCDRB #authoring #documentation #hypermedia #performance #using
Audiovisual-Based Hypermedia Authoring: Using Structured Representations for Efficient Access to AV Documents (GA, JC, OC, TD, RR, BB), pp. 169–178.
ICDARICDAR-1999-AntonacopoulosC #analysis #comparative #representation #using
Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
ICDARICDAR-1999-BansalS #how #on the #recognition
On How to Describe Shapes of Devanagari Characters and Use Them for Recognition (VB, RMKS), pp. 410–413.
ICDARICDAR-1999-BippusM #2d #recognition #reduction #using
Script Recognition using Inhomogeneous P2DHMM and Hierarchical Search Space Reduction (RDB, VM), pp. 773–776.
ICDARICDAR-1999-BrakensiekKWWR #evaluation #hybrid #modelling #online #performance #recognition #using
Performance Evaluation of a New Hybrid Modeling Technique for Handwriting Recognition using On-Line and Off-Line Data (AB, AK, DW, WW, GR), pp. 446–449.
ICDARICDAR-1999-BunkeSYS #online #using #video
Online Handwriting Data Acquisition using a Video Camera (HB, TvS, TY, MS), pp. 573–576.
ICDARICDAR-1999-ChangLTH #analysis #documentation #image #multi #using
Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
ICDARICDAR-1999-ChoiO #network #recognition #using
A Segmentation-free Recognition of Two Touching Numerals using Neural Network (SMC, ISO), pp. 253–256.
ICDARICDAR-1999-FujisawaSWK #image #recognition #using
Handwritten Numeral Recognition using Gradient and Curvature of Gray Scale Image (YF, MS, TW, FK), pp. 277–280.
ICDARICDAR-1999-HebertPG #detection #incremental #learning #using
Cursive Character Detection using Incremental Learning (JFH, MP, NG), pp. 808–811.
ICDARICDAR-1999-Hirayama #framework #using
A Framework for Forms Processing using Enhanced-Line-Shared-Adjacent Format (YH), pp. 103–106.
ICDARICDAR-1999-JeeKL #fault #using
Error Correction of Korean Courtesy Amounts in Bank Slips using Rule Information and cross-referencing (TCJ, EJK, YL), pp. 95–98.
ICDARICDAR-1999-JobbinsE #documentation #multi #using
Segmenting Documents using Multiple Lexical Features (ACJ, LJE), pp. 721–724.
ICDARICDAR-1999-JungSS #classification #multi #using
Multifont Classification using Typographical Attributes (MCJ, YCS, SNS), pp. 353–356.
ICDARICDAR-1999-KameshiroHOY #documentation #fault #image #multi #recognition #retrieval #segmentation #using
A Document Image Retrieval Method Tolerating Recognition and Segmentation Errors of OCR using Shape-Feature and Multiple Candidates (TK, TH, YO, FY), pp. 681–684.
ICDARICDAR-1999-Kawatani #classification #recognition #using
Handwritten Kanji Recognition using Combined Complementary Classifiers in a Cascade Arrangement (TK), pp. 503–506.
ICDARICDAR-1999-KhanH #recognition #using
Recognition of Real-Life Character Samples using a Structural Variation and Degradation Model (NAK, HH), pp. 225–228.
ICDARICDAR-1999-KiseMYM #automation #documentation #generative #hypermedia #keyword #on the
On the Use of Density Distribution of Keywords for Automated Generation of Hypertext Links from Arbitrary Parts of Documents (KK, HM, MY, KM), pp. 301–304.
ICDARICDAR-1999-KosmalaRLP #graph grammar #markov #modelling #online #recognition #using
On-Line Handwritten Formula Recognition using Hidden Markov Models and Context Dependent Graph Grammars (AK, GR, SL, LP), pp. 107–110.
ICDARICDAR-1999-LebourgeoisBE #learning #using
Structure Relation between Classes for Supervised Learning using Pretopology (FL, MB, HE), pp. 33–36.
ICDARICDAR-1999-LebourgeoisE #analysis #documentation #using
Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
ICDARICDAR-1999-LiuN #network #recognition #using
Handwritten Numeral Recognition using Neural Networks: Improving the Accuracy by Discriminative Training (CLL, MN), pp. 257–260.
ICDARICDAR-1999-MizukamiMYY #using #verification
An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
ICDARICDAR-1999-MullerER #database #multi #retrieval #sketching #using
Multimedia Database Retrieval using Hand-Drawn Sketches (SM, SE, GR), pp. 289–292.
ICDARICDAR-1999-NagasakiYN #automation #difference #pattern matching #recognition #using
Relaxation-based Pattern Matching using Automatic Differentiation for Off-line Character Recognition (TN, TY, MN), pp. 229–232.
ICDARICDAR-1999-NishimuraKMN #algorithm #feature model #multi #recognition #using
Off-line Character Recognition using HMM by Multiple Directional Feature Extraction and Voting with Bagging Algorithm (HN, MK, MM, YN), pp. 49–52.
ICDARICDAR-1999-OkamotoY #online #recognition #using
On-line Handwritten Character Recognition Method using Directional Features and Clockwise/Counterwise Direction-Change Features (MO, KY), pp. 491–494.
ICDARICDAR-1999-PalmeroD #documentation #using
Structured Document Labeling and Rule Extraction using a New Recurrent Fuzzy-neural System (GISP, YAD), pp. 181–184.
ICDARICDAR-1999-RemakiC #documentation #image #kernel #product line #using #visual notation
Visual Data Extraction from Bi-level Document Images using a Generalized Kernel Family with Compact Support, in Scale-Space (LR, MC), pp. 609–612.
ICDARICDAR-1999-SaidYS #recognition #using
Recognition of English and Arabic Numerals using a Dynamic Number of Hidden Neurons (FNS, RAY, CYS), pp. 237–240.
ICDARICDAR-1999-SawakiMH #image #recognition #using
Character Recognition in Bookshelf Images using Context-based Image Templates (MS, HM, NH), pp. 79–82.
ICDARICDAR-1999-SchomakerVL #image #query
New Use for the Pen: Outline-based Image Queries (LS, LV, EdL), pp. 293–296.
ICDARICDAR-1999-StuckelbergD #on the #probability #reasoning #recognition #using
On Musical Score Recognition using Probabilistic Reasoning (MVS, DSD), pp. 115–118.
ICDARICDAR-1999-TanYHWZ #using
Text/Graphics Separation using Agent-based Pyramid Operations (CLT, BY, WH, QW, ZZ), pp. 169–172.
ICDARICDAR-1999-UchidaS #2d #recognition #using
Handwritten Character Recognition using Monotonic and Continuous Two-dimensional Warping (SU, HS), pp. 499–502.
ICDARICDAR-1999-ViswanathanBDT #documentation #retrieval #using
Retrieval from Spoken Documents using Content and Speaker Information (MV, HSMB, SD, AT), pp. 567–572.
ICDARICDAR-1999-WakaharaK #correlation #invariant #using
Affine-Invariant Correlation of Gray-Scale Characters using GAT Iteration (TW, YK), pp. 613–616.
ICDARICDAR-1999-WorringT #clustering #documentation #segmentation #using
Segmentation of Color Documents by Line Oriented Clustering using Spatial Information (MW, LT), pp. 67–70.
ICDARICDAR-1999-WuS #classification #distance #multi #network #recognition #using
Unconstrained Handwritten Numeral Recognition using Hausdorff Distance and Multi-Layer Neural Network Classifier (XW, PS), pp. 249–252.
ICDARICDAR-1999-YamaokaIBK #approach #documentation #image #interactive #logic #using
Interactive Approach to the Extraction of Logical Structures from Unformatted Document Images Using a Sub-structure Model (MY, OI, NB, TK), pp. 185–188.
PODSPODS-1999-CluetKS #using
Using LDAP Directory Caches (SC, OK, DS), pp. 273–284.
PODSPODS-1999-CohenNS #query #using
Rewriting Aggregate Queries Using Views (SC, WN, AS), pp. 155–166.
PODSPODS-1999-PapadiasMT #multi #optimisation #using
Processing and Optimization of Multiway Spatial Joins Using R-Trees (DP, NM, YT), pp. 44–55.
SIGMODSIGMOD-1999-JarkeQBLMS #quality #using
Improving OLTP Data Quality Using Data Warehouse Mechanisms (MJ, CQ, GB, DL, GM, SS), pp. 536–537.
SIGMODSIGMOD-1999-LeeKC #estimation #multi #using
Multi-dimensional Selectivity Estimation Using Compressed Histogram Information (JHL, DHK, CWC), pp. 205–214.
SIGMODSIGMOD-1999-VitterW #approximate #multi #using
Approximate Computation of Multidimensional Aggregates of Sparse Data Using Wavelets (JSV, MW), pp. 193–204.
SIGMODSIGMOD-1999-Wu #optimisation #query #using
Query Optimization for Selections Using Bitmaps (MCW), pp. 227–238.
VLDBVLDB-1999-AcharyaGP #approximate #named #performance #query #using
Aqua: A Fast Decision Support Systems Using Approximate Query Answers (SA, PBG, VP), pp. 754–757.
VLDBVLDB-1999-SahuguetA #legacy #using #web
Building Light-Weight Wrappers for Legacy Web Data-Sources Using W4F (AS, FA), pp. 738–741.
VLDBVLDB-1999-WangZL #classification #proximity #using
Building Hierarchical Classifiers Using Class Proximity (KW, SZ, SCL), pp. 363–374.
ITiCSEITiCSE-1999-ArnowB #education #online #programming #using #web
On-line programming examinations using Web to teach (DA, OB), pp. 21–24.
ITiCSEITiCSE-1999-Clear #collaboration #concept #education #interactive #learning
A collaborative learning trial between New Zealand and Sweden-using Lotus Notes Domino in teaching the concepts of Human Computer Interaction (TC), pp. 111–114.
ITiCSEITiCSE-1999-Gerhardt-PowalsP #question
The digital millennium copyright act: an international assault on fair use? (JGP, MHP), p. 191.
ITiCSEITiCSE-1999-KoffmanW #java #using
CS1 using Java language features gently (EBK, UW), pp. 40–43.
ITiCSEITiCSE-1999-Levin #education
Use of a soundcard in teaching audio frequency and analog modem communications (MHL), pp. 79–83.
ITiCSEITiCSE-1999-Polak #case study #communication #education #using
Teaching computer communication skills using case study method (PP), p. 190.
ITiCSEITiCSE-1999-PutSZ #network #student
The system of checking students’ knowledge with the use of wide area networks (DP, JS, MZ), p. 192.
ITiCSEITiCSE-1999-PutSZ99a #education #internet #process
The use of the Internet in the teaching process (DP, JS, MZ), p. 193.
ITiCSEITiCSE-1999-SeffahBD #object-oriented #using
Assessing object-oriented technology skills using an Internet-based system (AS, MB, MD), pp. 71–74.
ITiCSEITiCSE-1999-YangB #education #interface #java #programming #using
Using Java and the socket interface in teaching client/server programming (AY, YB), p. 206.
FASEFASE-1999-LopesF #using
Using Explicit State to Describe Architechtures (AL, JLF), pp. 144–160.
FoSSaCSFoSSaCS-1999-Sangiorgi #concurrent #reasoning #using
Reasoning About Concurrent Systems Using Types (DS), pp. 31–40.
TACASTACAS-1999-BehrmannLAHL #composition #reuse #using #verification
Verification of Hierarchical State/Event Systems Using Reusability and Compositionality (GB, KGL, HRA, HH, JLN), pp. 163–177.
TACASTACAS-1999-Heljanko #concurrent #logic programming #petri net #problem #reachability #semantics #source code #using
Using Logic Programs with Stable Model Semantics to Solve Deadlock and Reachability Problems for 1-Safe Petri Nets (KH), pp. 240–254.
TACASTACAS-1999-Hirschkoff #bisimulation #on the #using #verification
On the Benefits of Using the Up-To Techniques for Bisimulation Verification (DH), pp. 285–299.
TACASTACAS-1999-KahloucheVZ #communication #consistency #hardware #protocol #testing #using
Hardware Testing Using a Communication Protocol Conformance Testing Tool (HK, CV, MZ), pp. 315–329.
CSMRCSMR-1999-KrikhaarPZ #resource management
Employing Use-cases and Domain Knowledge for Comprehending Resource Usage (RLK, MP, JZ), pp. 14–21.
CSMRCSMR-1999-LamLS #metric #requirements #using
Managing Requirements Change Using Metrics and Action Planning (WL, ML, VS), pp. 122–129.
CSMRCSMR-1999-Tonella #analysis #points-to #set
Effects of Different Flow Insensitive Points-to Analyses on DEF/USE Sets (PT), pp. 62–71.
ICSMEICSM-1999-BriandWL #impact analysis #metric #object-oriented #using
Using Coupling Measurement for Impact Analysis in Object-Oriented Systems (LCB, JW, HL), pp. 475–482.
ICSMEICSM-1999-BurdM #c #cobol
Evaluating the Use of Dominance Trees for C and COBOL (EB, MM), pp. 401–410.
ICSMEICSM-1999-GallJR #visualisation
Visualizing Software Release Histories: The Use of Color and Third Dimension (HG, MJ, CR), pp. 99–108.
ICSMEICSM-1999-LapierreMSAFT #automation #execution #generative #linear #programming #testing #using
Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees (SL, EM, GS, GA, RF, PT), pp. 189–198.
ICSMEICSM-1999-Ward #assembly #c #migration #using
Assembler to C Migration Using the FermaT Transformation System (MPW), pp. 67–76.
ICSMEICSM-1999-ZhouB #ada #source code #using
Extracting Objects of Ada Programs Using Module Features (YZ, BX), p. 23–?.
IWPCIWPC-1999-CainM #c++ #lens #using #visualisation
Program Visualisation using C++ Lenses (JWC, RJM), pp. 20–26.
IWPCIWPC-1999-DeursenM #cobol #comprehension #using
Understanding COBOL Systems using Inferred Types (AvD, LM), pp. 74–81.
PASTEPASTE-1999-Agrawal #graph #performance #testing #using
Efficient Coverage Testing Using Global Dominator Graphs (HA), pp. 11–20.
PASTEPASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #using #verification
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
PASTEPASTE-1999-SouterPH #analysis
Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
WCREWCRE-1999-Jermaine #using
Computing Program Modularizations Using the k-Cut Method (CJ), pp. 224–234.
WCREWCRE-1999-SchlesingerR #development #library
Educating JACKAL: Cliché Library Development and Use (JDS, AAR), p. 123–?.
PLDIPLDI-1999-Vegdahl #graph #using
Using Node Merging to Enhance Graph Coloring (SRV), pp. 150–154.
SASSAS-1999-TakimotoH #graph #using
Partial Dead Code Elimination Using Extended Value Graph (MT, KH), pp. 179–193.
STOCSTOC-1999-Trevisan #generative #pseudo #using
Construction of Extractors Using Pseudo-Random Generators (Extended Abstract) (LT), pp. 141–148.
FLOPSFLOPS-1999-BeierleM #approximate #prolog #source code #type checking #using
Using Types as Approximations for Type Checking Prolog Programs (CB, GM), pp. 251–266.
FLOPSFLOPS-1999-VerbaetenS #analysis #logic programming #source code #termination #using
Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
ICALPICALP-1999-CrochemoreMRS #using
Text Compression Using Antidictionaries (MC, FM, AR, SS), pp. 261–270.
ICALPICALP-1999-Galpin #algebra #comparison #process #using
Comparison of Process Algebra Equivalences Using Formats (VG), pp. 341–350.
FMFM-v1-1999-Bousquet #case study #detection #experience #feature model #interactive #model checking #testing #using
Feature Interaction Detection Using Testing and Model-Checking Experience Report (LdB), pp. 622–641.
FMFM-v1-1999-SabatierL #design #formal method #smarttech #transaction #validation
The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications (DS, PL), pp. 348–368.
FMFM-v1-1999-TabourierCI #empirical #protocol #testing #using
A GSM-MAP Protocol Experiment Using Passive Testing (MT, ARC, MI), pp. 915–934.
FMFM-v2-1999-Droschl #data access #requirements #using
Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
FMFM-v2-1999-Feijs #modelling #using #π-calculus
Modelling Microsoft COM Using π-Calculus (LMGF), pp. 1343–1363.
FMFM-v2-1999-HorlA #communication #specification
Formal Specification of a Voice Communication System Used in Air Traffic Control (JH, BKA), p. 1868.
FMFM-v2-1999-HorsteS #formal method #modelling #petri net #simulation #using
Formal Modelling and Simulation of Train Control Systems Using Petri Nets (MMzH, ES), p. 1867.
FMFM-v2-1999-Jonkers #communication #interactive #using
Communication and Synchronisation Using Interaction Objects (HBMJ), pp. 1321–1342.
FMFM-v2-1999-KnightFH #tool support
Tool Support for Production Use of Formal Techniques (JCK, PTF, BRH), p. 1854.
FMFM-v2-1999-MarchandS #design #incremental #synthesis #using
Incremental Design of a Power Transformer Station Controller Using a Controller Synthesis Methodology (HM, MS), pp. 1605–1624.
FMFM-v2-1999-Nakajima #algebra #development #framework #object-oriented #specification #using
Using Algebraic Specification Techniques in Development of Object-Oriented Frameworks (SN), pp. 1664–1683.
FMFM-v2-1999-PolackS #development #using
Systems Development Using Z Generics (FP, SS), pp. 1048–1067.
IFMIFM-1999-DerrickB #component #specification #using
Specifying Component and Context Specification Using Promotion (JD, EAB), pp. 293–312.
IFMIFM-1999-Paige #communication #concurrent #refinement #specification #using
Specification and Refinement using a Heterogeneous Notation for Concurrency and Communication (RFP), pp. 353–372.
IFMIFM-1999-TreharneS #algebra #process #using
Using a Process Algebra to Control B Operations (HT, SS), pp. 437–456.
ICFPICFP-1999-Huch #abstract interpretation #erlang #source code #using #verification
Verification of Erlang Programs using Abstract Interpretation and Model Mhecking (FH), pp. 261–272.
IFLIFL-1999-WieringAP #framework #game studies #using
Using Clean for Platform Games (MW, PA, MJP), pp. 1–17.
AGTIVEAGTIVE-1999-NiereZ #development #using
Using FUJABA for the Development of Production Control Systems (JN, AZ), pp. 181–191.
AGTIVEAGTIVE-1999-NiereZ99a #simulation #testing #using
Testing and Simulating Production Control Systems Using the Fujaba Environment (JN, AZ), pp. 449–456.
AGTIVEAGTIVE-1999-RibeiroC #composition #graph grammar #modelling #simulation #using
Compositional Construction of Simulation Models Using Graph Grammars (LR, BC), pp. 87–94.
AGTIVEAGTIVE-1999-Schleicher #formal method #graph transformation #modelling #process #uml #using
Formalizing UML-Based Process Models Using Graph Transformations (AS), pp. 341–357.
AGTIVEAGTIVE-1999-ZamperoniE #aspect-oriented #exclamation #experience #graph grammar #integration #re-engineering #term rewriting #using
Formal Integration of Software Engineering Aspects Using Graph Rewrite Systems — A Typical Experience?! (AZ, GE), pp. 359–367.
CHICHI-1999-BhavnaniJF #empirical
The Strategic Use of CAD: An Empirically Inspired, Theory-Based Course (SKB, BEJ, UF), pp. 183–190.
CHICHI-1999-ByrneJWC #web
The Tangled Web we Wove: A Taskonomy of WWW Use (MDB, BEJ, NSW, DCC), pp. 544–551.
CHICHI-1999-FaradayS #authoring #using #web
Authoring Animated Web Pages Using “Contact Points” (PF, AGS), pp. 458–465.
CHICHI-1999-HornofK #how #modelling #people
Cognitive Modeling Demonstrates How People Use Anticipated Location Knowledge of Menu Items (AJH, DEK), pp. 410–417.
CHICHI-1999-JohnsonWBKB #interface #using
Sympathetic Interfaces: Using a Plush Toy to Direct Synthetic Characters (MPJ, ADW, BB, CK, AFB), pp. 152–158.
HCIHCI-CCAD-1999-BoschianLDMJ #artificial reality #how #people #question
How can people with disabilities navigate in virtual reality with an input device they can use? (KB, AL, RCD, UM, GJ), pp. 1111–1115.
HCIHCI-CCAD-1999-BrownS #development #education #learning #people
An illustrated methodology for the development of virtual learning environments for use by people in special needs education (DJB, DSS), pp. 1105–1110.
HCIHCI-CCAD-1999-Callear #education
ITEs as teacher substitutes: use and feasability (DC), pp. 632–636.
HCIHCI-CCAD-1999-Chiu #algorithm #approach #learning #search-based #using
Learning path planning using genetic algorithm approach (CC), pp. 71–75.
HCIHCI-CCAD-1999-DuLL #development #memory management #metric #using
Using the memory load measurement to improve software development (TCD, CJL, CGL), pp. 53–57.
HCIHCI-CCAD-1999-FujishigeJK #automaton #finite #recognition #using #word
Recognition of Japanese sign language words using finite automata (EF, KJ, TK), pp. 167–171.
HCIHCI-CCAD-1999-GermannBO #artificial reality
Assisting individuals with disabilities through the use of virtual reality technologies (CG, JKB, POJ), pp. 952–956.
HCIHCI-CCAD-1999-HickeyKA #distributed #mobile #using
Mobile virtual participation in a distributed meeting using an omni-directional camera system (SH, KK, SA), pp. 533–537.
HCIHCI-CCAD-1999-InmanL #education #using
Teaching orientation and mobility skills to blind children using simulated acoustical environments (DPI, KL), pp. 1090–1094.
HCIHCI-CCAD-1999-JohnsonO #learning #multi #problem #using
Innovative mathematical learning environments — Using multimedia to solve real world problems (LFJ, POJ), pp. 677–681.
HCIHCI-CCAD-1999-Jones #community #development #user interface #using
Using the paper user interface to support community involvement in urban development (RMJ), pp. 427–431.
HCIHCI-CCAD-1999-Kameneva #communication #education
Educational use of communication and information technologies in Ukraine (TK), pp. 701–706.
HCIHCI-CCAD-1999-KirvesojaOVTKH #health #implementation
Implementation criteria for a videophone system used in telemedicine — a case in Finnish health care (HK, AO, SV, VT, MK, UH), pp. 271–275.
HCIHCI-CCAD-1999-Kita #using
Intelligent plant inspection by using foveated active vision sensor (NK), pp. 1177–1181.
HCIHCI-CCAD-1999-KlobasM #behaviour
A planned behavior in context model of networked information resource use (JEK, DM), pp. 823–827.
HCIHCI-CCAD-1999-Machate #concept #interactive #multimodal #smarttech
Being natural — on the use of multimodal interaction concepts in smart homes (JM), pp. 937–941.
HCIHCI-CCAD-1999-MaidaNM #using
Effects on training using illumination in virtual environments (JM, JN, KM), pp. 1124–1128.
HCIHCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
HCIHCI-CCAD-1999-Morishima #communication #multi #using
Multiple points face-to-face communication in cyberspace using multi-modal agent (SM), pp. 177–181.
HCIHCI-CCAD-1999-PapaioannouN #user interface #using
An optimum UI for using a high comfort and enhanced manoeuvrability wheelchair for transportation tasks (GP, AN), pp. 932–936.
HCIHCI-CCAD-1999-RamalhoBCCLMMV #experience #internet
Cyber Rally: An experience of democratic use of the internet (GR, FAB, SC, AC, ML, SRdLM, HPM, AV), pp. 402–406.
HCIHCI-CCAD-1999-SearsB #recognition #speech
Redesigning speech recognition for use by individuals with spinal cord injuries (AS, JBR), pp. 966–969.
HCIHCI-CCAD-1999-Seki #using #visual notation
Systematic auditory training of obstacle sense for the visually impaired by using acoustical VR system (YS), pp. 999–1003.
HCIHCI-CCAD-1999-ShimizuIN #locality #representation #using
Pattern representation system using movement sense of localized sound (MS, KI, TN), pp. 990–994.
HCIHCI-CCAD-1999-TornbergV #concurrent #process #using
Concurrent engineering activities using videophone communications (VT, SV), pp. 256–260.
HCIHCI-CCAD-1999-TrousseJK #approach #behaviour #recommendation #similarity #using
Using user behaviour similarity for recommendation computation: the broadway approach (BT, MJ, RK), pp. 85–89.
HCIHCI-CCAD-1999-WeberLZ #using
Symbolic tele-communication using the WWW (HW, FL, KJZ), pp. 802–806.
HCIHCI-CCAD-1999-YuCK #approximate #multi #using
Dynamic event filtering technique using multi-level path approximation in a shared virtual environment (SJY, YCC, KK), pp. 583–587.
HCIHCI-EI-1999-Baudisch #scalability #using
Using a Painting Metaphor to Rate Large Numbers of Objects (PB), pp. 266–270.
HCIHCI-EI-1999-BondarovskaiaS #social #using
Psychological, Ethic, and Social Peculiarities of Using New Information Technologies (VMB, AAS), pp. 129–132.
HCIHCI-EI-1999-BuckleHWH
Investigation of the Use of Non-Keyboard Input Devices (NKID) (PB, RAH, VW, SH), pp. 102–105.
HCIHCI-EI-1999-CarbonellD #empirical #gesture #human-computer #multimodal #speech
Empirical data on the use of speech and gestures in a multimodal human-computer environment (NC, PD), pp. 446–450.
HCIHCI-EI-1999-Chuan #case study #using #web
Small Group CSCW Using Web Recources: A Case Study (TKC), pp. 788–792.
HCIHCI-EI-1999-DzidaF #documentation #prototype #question
Documentation of Prototypes in Terms of Use Scenarios: Nice to Have or Indispensable? (WD, RF), pp. 905–908.
HCIHCI-EI-1999-Furtado #approach #design #usability #user interface #using
An Approach to Improve Design and Usability of User Interfaces for Supervision Systems by Using Human Factors (EF), pp. 993–997.
HCIHCI-EI-1999-HertzumJ
The Evaluator Effect during First-Time Use of the Cognitive Walkthrough Technique (MH, NEJ), pp. 1063–1067.
HCIHCI-EI-1999-KohzukiNTUHT #eye tracking #interactive #using
Man-Machine Interaction Using Eye Movement (KK, TN, AT, MU, SH, KT), pp. 407–411.
HCIHCI-EI-1999-Kovalenko #visual notation
Visual Strain and Eye Disorders in display Uses (VK), pp. 184–186.
HCIHCI-EI-1999-LindstromH #difference #industrial
VDT Use and its Relation to Job Stress in Various Sectors of industry in Finland: Qualitative Differences (KL, VH), pp. 187–192.
HCIHCI-EI-1999-MachiiMAKYKNK #3d #interface #internet #using
An Easy Internet Browsing System with Sophisticated Human Interface Using 3-D Graphics (KM, SM, YA, SK, MY, KK, YN, KK), pp. 228–232.
HCIHCI-EI-1999-OHaraB #guidelines
Software Tool for the Use of Human Factors Engineering Guidelines to Conduct Control Room Evaluations (JMO, WSB), pp. 973–977.
HCIHCI-EI-1999-SchmittO #using
Calculation of Totally Optimized Button Configurations Using Fitts’ Law (AS, PO), pp. 392–396.
HCIHCI-EI-1999-SegenK #animation #gesture #interactive #interface #using
Dextrous Interaction with Computer Animations using Vision-Based Gesture Interface (JS, SK), pp. 281–285.
HCIHCI-EI-1999-ShibuyaT #image #interface #using #video
Interface Using Video Captured Images (YS, HT), pp. 247–250.
HCIHCI-EI-1999-Stroem #concept #design
Inattentive Use: A New design Concept (GS), pp. 1153–1157.
HCIHCI-EI-1999-TakahashiK #3d #interface #using
3-D Input Device Using a Ball Rotation Interface (TT, MK), pp. 397–401.
HCIHCI-EI-1999-Takeda #approach #communication #diagrams
Evolutionary Approach to Revolutionary Use of Software Diagrams in Client-Designer Communication (KT), pp. 866–870.
HCIHCI-EI-1999-TeiwesBEMST #eye tracking #human-computer #interactive #research #testing #usability
The Use of Eye Tracking for Human-Computer Interaction Research and Usability Testing (WT, MB, GWE, SM, ES, WT), pp. 1119–1122.
HCIHCI-EI-1999-Urokohara #analysis #design #usability #user interface #using
Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
HCIHCI-EI-1999-VienneJJ #adaptation #fuzzy #interface #logic
Use of Fuzzy Logic in an Adaptive Interface meant for Teleoperation (FV, AMJD, DJ), pp. 306–310.
HCIHCI-EI-1999-ZuhlkeK #industrial
Pointing Devices for Industrial Use (DZ, LK), pp. 402–406.
AdaEuropeAdaEurope-1999-ChapmanD #safety #using
Re-engeneering a Safety-Critical Application Using SPARK 95 and GNORT (RC, RD), pp. 39–51.
AdaEuropeAdaEurope-1999-FranchPV #component #library #non-functional #using
Browsing a Component Library Using Non-functional Information (XF, JP, JV), pp. 332–343.
AdaEuropeAdaEurope-1999-Hagenauer #distributed #on the #simulation
On the Use of Controlled Types for Fossil Collection in a Distributed Simulation Systems (HH), pp. 238–249.
AdaEuropeAdaEurope-1999-LopezVV #ada #design #embedded #hardware #using
Hardware/Software Embedded System Specifiaction and Design Using Ada and VHDL (AL, MV, EV), pp. 356–370.
AdaEuropeAdaEurope-1999-MillanLM #ada #adaptation #java #persistent #using
An Adaptation of our Ada95/O2 Binding to Provide Persistence to the Java Language: Sharing and Handling of Data between Heterogenous Applications using Persistence (TM, ML, FM), pp. 320–331.
AdaSIGAda-1999-BallbastreTVC #ada #case study #distributed #experience #realtime #using
Experiences using Ada in a real-time and distributed laboratory (PB, ST, JViC, AC), pp. 145–155.
AdaSIGAda-1999-Colket #analysis #realtime #using
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
AdaSIGAda-1999-NeedhamDP #ada #distributed #object-oriented #towards #using
Towards a distributed object-oriented propagation model using Ada95 (DMN, SAD, TJP), pp. 203–210.
CAiSECAiSE-1999-Oh #architecture #design #transaction #using
The Design of Cooperative Transaction Model by Using Client-Server Architecture (Abstract) (AsO), p. 269.
EDOCEDOC-1999-BlancGD #concept #enterprise #uml #using
Using the UML language to express the ODP enterprise concepts (XB, MPG, RLD), pp. 50–59.
EDOCEDOC-1999-Linington #community #enterprise #policy #uml #using
Options for expressing ODP enterprise communities and their policies by using UML (PFL), pp. 72–82.
ICEISICEIS-1999-BarjisD #analysis #modelling #network #process #using
Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
ICEISICEIS-1999-Chattopadhyay #bibliography #enterprise #using
Overview of Enterprise Management Using SAP R/3 (SPC), p. VIII.
ICEISICEIS-1999-CostaHA #process #using
Facilitating Organisational Activities Using Plans and Audits (CJC, TH, PA), pp. 404–411.
ICEISICEIS-1999-Falsarella #corba #execution #framework #implementation #multi #using
Multi Language and Multi Platform Suport for Agent Execution Using CORBA Platform-An Implementation (OMF), p. 772.
ICEISICEIS-1999-FrantiDSS #automaton #data access #using
Using Intelligent Retina with Cellular Automata in Access Control (EF, MD, GS, MS), pp. 219–224.
ICEISICEIS-1999-Garcia-FanjulMRT #internet #named #online #using
TIBLEUS: A Model to Build Internet Online Support Services Using ASP (JGF, CM, CdlR, JT), pp. 619–625.
ICEISICEIS-1999-MisraSKML #enterprise #information management #integration #scalability #using
Integration of Information Systems in Large-Scale Enterprises Using Model-Integrated Computing (AM, JS, GK, MM, ÁL), pp. 485–492.
ICEISICEIS-1999-MoreiraA #case study #generative #specification
Generating Object-Z Specifications from Use Cases (AMDM, JA), pp. 493–500.
ICEISICEIS-1999-NicolleCY #using
Using Transformation Paths to Translate and Migrate Data (CN, NC, KY), pp. 125–131.
ICEISICEIS-1999-Whymark #requirements #using
Using Criticality as a Basis for Determining Information Requirements for an EIS (GKW), pp. 542–549.
ICEISICEIS-1999-Wu #case study #perspective #web
A Causal Model for the Intention to Use a Web Site: A Study Based on the Technology Acceptance Model and the Uses and Gratifications Perspective (CJW), p. 788.
CIKMCIKM-1999-GeffnerAAS #classification #library #scalability #using
Browsing Large Digital Library Collections Using Classification Hierarchies (SG, DA, AEA, TRS), pp. 195–201.
CIKMCIKM-1999-LabrouF #category theory #documentation #exclamation #ontology #using
Yahoo! As an Ontology: Using Yahoo! Categories to Describe Documents (YL, TWF), pp. 180–187.
CIKMCIKM-1999-LiY #classification #probability #using
Text Classification Using ESC-based Stochastic Decision Lists (HL, KY), pp. 122–130.
CIKMCIKM-1999-Scoggins
A Practitioners’ View of Techniques Used in Data Warehousing for Sifting Through Data to Provide Information (JTS), pp. 3–4.
CIKMCIKM-1999-WangXL #clustering #scalability #transaction #using
Clustering Transactions Using Large Items (KW, CX, BL), pp. 483–490.
CIKMCIKM-1999-YoonHPM #information management #using
Using Domain Knowledge in Knowledge Discovery (SCY, LJH, EKP, SAMM), pp. 243–250.
ICMLICML-1999-AbeL #concept #learning #linear #probability #using
Associative Reinforcement Learning using Linear Probabilistic Concepts (NA, PML), pp. 3–11.
ICMLICML-1999-BrodieD #induction #learning #using
Learning to Ride a Bicycle using Iterated Phantom Induction (MB, GD), pp. 57–66.
ICMLICML-1999-BurgardFJMT #mobile #scalability #using
Sonar-Based Mapping of Large-Scale Mobile Robot Environments using EM (WB, DF, HJ, CM, ST), pp. 67–76.
ICMLICML-1999-FiroiuC #markov #modelling #using
Abstracting from Robot Sensor Data using Hidden Markov Models (LF, PRC), pp. 106–114.
ICMLICML-1999-FrankW
Making Better Use of Global Discretization (EF, IHW), pp. 115–123.
ICMLICML-1999-Joachims #classification #using
Transductive Inference for Text Classification using Support Vector Machines (TJ), pp. 200–209.
ICMLICML-1999-RennieM #learning #using #web
Using Reinforcement Learning to Spider the Web Efficiently (JR, AM), pp. 335–343.
ICMLICML-1999-SakakibaraK #context-free grammar #learning #using
GA-based Learning of Context-Free Grammars using Tabular Representations (YS, MK), pp. 354–360.
KDDKDD-1999-BarbaraW #approximate #data analysis #using
Using Approximations to Scale Exploratory Data Analysis in Datacubes (DB, XW), pp. 382–386.
KDDKDD-1999-BrijsSVW #case study #using
Using Association Rules for Product Assortment Decisions: A Case Study (TB, GS, KV, GW), pp. 254–260.
KDDKDD-1999-GantiGR #category theory #clustering #named #summary #using
CACTUS — Clustering Categorical Data Using Summaries (VG, JG, RR), pp. 73–83.
KDDKDD-1999-LarsenA #clustering #documentation #effectiveness #linear #mining #performance #using
Fast and Effective Text Mining Using Linear-Time Document Clustering (BL, CA), pp. 16–22.
KDDKDD-1999-LiuHMC #mining #using
Mining Interesting Knowledge Using DM-II (BL, WH, YM, SC), pp. 430–434.
KDDKDD-1999-MannilaPS #predict #using
Prediction with Local Patterns using Cross-Entropy (HM, DP, PS), pp. 357–361.
KDDKDD-1999-MeretakisW #classification #naive bayes #using
Extending Naïve Bayes Classifiers Using Long Itemsets (DM, BW), pp. 165–174.
KDDKDD-1999-NagDD #interactive #using
Using a Knowledge Cache for Interactive Discovery of Association Rules (BN, PD, DJD), pp. 244–253.
KDDKDD-1999-ZhangRL #database #estimation #kernel #performance #scalability #using
Fast Density Estimation Using CF-Kernel for Very Large Databases (TZ, RR, ML), pp. 312–316.
MLDMMLDM-1999-PalenichkaV #image #multi #using
Extraction of Local Structural Features in Images by Using a Multi-scale Relevance Function (RMP, MAV), pp. 87–102.
SEKESEKE-1999-AlthoffNT
Systematically Diagnosing and Improving the Perceived Usefulness of Organizational Memories (KDA, MN, CT), pp. 72–86.
SIGIRSIGIR-1999-Eguchi #adaptation #clustering #incremental #query #using
Adaptive Cluster-Based Browsing Using Incrementally Expanded Queries and its Effects (poster abstract) (KE), pp. 265–266.
SIGIRSIGIR-1999-JonesS #documentation #interactive #named #retrieval #using
Phrasier: A System for Interactive Document Retrieval Using Keyphrases (SJ, MSS), pp. 160–167.
SIGIRSIGIR-1999-LosadaB #documentation #modelling #ranking #using
Using a Belief Revision Operator for Document Ranking in Extended Boolean Models (DEL, AB), pp. 66–73.
SIGIRSIGIR-1999-PapadiasMKMA #heuristic #retrieval #using
Content-Based Retrieval Using Heuristic Search (DP, MM, PK, NM, IA), pp. 168–175.
UMLUML-1999-BalustG #modelling #process #uml #using
Using UML for Software Process Modelling (JMRB, XF), pp. 292–307.
UMLUML-1999-DemuthH #constraints #database #design #ocl #relational #uml #using
Using UML/OCL Constraints for Relational Database Design (BD, HH), pp. 598–613.
UMLUML-1999-Hilliard #architecture #uml #using
Using the UML for Architectural Description (RH), pp. 32–48.
UMLUML-1999-KimC #diagrams #formal method #uml #using
Formalizing the UML Class Diagram Using Object-Z (SKK, DAC), pp. 83–98.
UMLUML-1999-PetreBP #case study #contract #uml
Analysing UML Use Cases as Contracts (LP, RJB, IP), pp. 518–533.
ECOOPECOOP-1999-PangHLS #multi #using
Multi-method Dispatch Using Multiple Row Displacement (CP, WH, YL, DS), pp. 304–328.
OOPSLAOOPSLA-1999-KerstenM #aspect-oriented #case study #learning #named #programming #using
Atlas: A Case Study in Building a Web-Based Learning Environment using Aspect-oriented Programming (MK, GCM), pp. 340–352.
OOPSLAOOPSLA-1999-KrintzCH #java #using
Reducing Transfer Delay Using Java Class File Splitting and Prefetching (CK, BC, UH), pp. 276–291.
OOPSLAOOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality #using
Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
TOOLSTOOLS-ASIA-1999-BajgoricADU #automation #development #paradigm #using
Using Paradigm Plus CASE Tool in a Fusion-Based Application Development Project (NB, IKA, MD, ), pp. 424–427.
TOOLSTOOLS-ASIA-1999-KatribFP #java #thread #using
Synchronizing Java Threads Using Assertions (MK, DF, EP), pp. 51–60.
TOOLSTOOLS-ASIA-1999-LuDD #approach #evolution #object-oriented #using
A Equivalent Object-Oriented Schema Evolution Approach Using the Path-Independence Language (JL, CD, WD), pp. 212–217.
TOOLSTOOLS-ASIA-1999-ShenLSZ #algorithm #architecture #graph #object-oriented #using
An Algorithm for Describing Object-Oriented Software Architecture Using Graph (HHS, CL, MMS, WMZ), pp. 225–231.
TOOLSTOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
TOOLSTOOLS-EUROPE-1999-Bosch #architecture #design #industrial
Design and Use of Industrial Software Architectures (JB), p. 404.
TOOLSTOOLS-EUROPE-1999-Collins-Cope #analysis #approach #case study #interface #requirements
The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
TOOLSTOOLS-EUROPE-1999-Edwards #java #programming #using #visual notation
Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java (SE), p. 413.
TOOLSTOOLS-EUROPE-1999-Korson #architecture #component #framework #using
Using Components, Patterns and Frameworks to Realize Architecture (TDK), p. 415.
TOOLSTOOLS-EUROPE-1999-Li #approach #automation #case study #diagrams #sequence chart
A Semi-Automatic Approach to Translating Use Cases to Sequence Diagrams (LL), pp. 184–193.
TOOLSTOOLS-EUROPE-1999-MensWD #architecture #classification #using
Declaratively Codifying Software Architectures Using Virtual Software Classifications (KM, RW, TD), pp. 33–45.
TOOLSTOOLS-EUROPE-1999-Poo #case study #identification #specification
Events in Use Cases as a Basis for Identifying and Specifying Classes and Business Rules (DCCP), pp. 204–213.
TOOLSTOOLS-EUROPE-1999-Simons #case study #harmful
Use Cases Considered Harmful (AJHS), pp. 194–203.
TOOLSTOOLS-PACIFIC-1999-CookKWMRW #product line #uml #using
Defining UML Family Members Using Prefaces (SC, AK, JW, RM, BR, ACW), pp. 102–114.
TOOLSTOOLS-PACIFIC-1999-HildebrandtH #corba #image #java #using
Dynamic Geospatial Image Mosaics Using JAVA, JAI, RMI and CORBA (JH, RH), pp. 254–264.
TOOLSTOOLS-PACIFIC-1999-Hussey #design pattern #specification #using
Using Design Patterns to Derive PAC Architectures from Object-Z Specifications (AH), pp. 40–51.
TOOLSTOOLS-USA-1999-Arsanjani #analysis #design #distributed #framework #implementation #java #using
Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
TOOLSTOOLS-USA-1999-ConcepcionLS #development #multi #recursion #thread #using
Managing the Software Development by Using the Recursive Multi- Threaded (RMT) Tool (AIC, SL, SJS), pp. 344–353.
TOOLSTOOLS-USA-1999-EgeRLL #database #java #using
Using Java to Add “Stored Procedures” to Databases (RKE, NR, JL, VL), pp. 322–331.
TOOLSTOOLS-USA-1999-Firesmith #case study #guidelines #modelling
Use Case Modeling Guidelines (DF), pp. 184–193.
TOOLSTOOLS-USA-1999-Lilly #case study #problem #using
Use Case Pitfalls: Top 10 Problems from Real Projects Using Use Cases (SL), pp. 174–183.
TOOLSTOOLS-USA-1999-MajoulPB #component #concurrent #coordination #java
A Concurrent Object-Based Model and its Use for Coordinating Java Components (SM, CP, JPB), p. 332–?.
TOOLSTOOLS-USA-1999-Mikhajlova #framework #java #source code #specification #using
Specifying Java Frameworks Using Abstract Programs (AM), p. 136–?.
GPCEGCSE-1999-DHondtMW #logic programming #using
Using Reflective Logic Programming to Describe Domain Knowledge as an Aspect (MD, WDM, RW), pp. 16–23.
LOPSTRLOPSTR-1999-HoweK #source code #using
Specialising Fininte Domain Programs Using Polyhedra (JMH, AK), pp. 118–135.
LOPSTRLOPSTR-1999-PeraltaG #approach #imperative #using
Imperative Program Specialisation: An Approach Using CLP (JCP, JPG), pp. 102–117.
PADLPADL-1999-GoltzM #constraints #logic programming #using
University Timetabling Using Constraint Logic Programming (HJG, DM), pp. 320–334.
PADLPADL-1999-Lai #constraints #debugging #proving #using
Using Constraints in Local Proofs for CLP Debugging (CL), pp. 350–359.
RERE-1999-AchourRSM #authoring #case study #empirical
Guiding Use Case Authoring: Results of an Empirical Study (CBA, CR, CS, NAMM), pp. 36–43.
RERE-1999-AmyotLBG #case study #distributed #requirements #validation
Use Case Maps for the Capture and Validation of Distributed Systems Requirements (DA, LL, RJAB, TG), p. 44–?.
RERE-1999-GreerBS #risk management #using
Prioritisation of System Changes using Cost-Benefit and Risk Assessments (DG, DWB, TS), p. 180–?.
RERE-1999-Potts99a #design #requirements
From “Requirements Engineering” to “Design for Usefulness” (CP), p. 189–?.
RERE-1999-Spence #case study #process #requirements #uml
Requirements, Use Cases, the UML and The Rational Unified Process (IS), p. 3–?.
RERE-1999-WielsE #formal method #modelling #using
Formal Modeling of Space Shuttle Software Change Requests using SCR (VW, SME), pp. 114–122.
SACSAC-1999-Al-OmariM #fault tolerance #using
Fault-Tolerant Routing in Hypercubes Using Masked Interval Routing Scheme (MAO, MM), pp. 481–485.
SACSAC-1999-Binkley #dependence #graph #slicing #using
Computing Amorphous Program Slices Using Dependence Graphs (DB), pp. 519–525.
SACSAC-1999-CraneWS #algorithm #multi #pipes and filters #scheduling #search-based #using
Scheduling of Multi-Product Fungible Liquid Pipelines Using Genetic Algorithms (DSC, RLW, DAS), pp. 280–285.
SACSAC-1999-FenwickD #automaton #estimation #using
Electrical Substation Service-Area Estimation Using Cellular Automata: An Initial Report (JWF, LJD), pp. 560–565.
SACSAC-1999-JonesK #algorithm #network #search-based
The Use of Genetic Algorithms and Neural Networks to Investigate the Baldwin Effect (MJ, AHK), pp. 275–279.
SACSAC-1999-KatayamaN #algorithm #problem #search-based #using
A New Iterated Local Search Algorithm Using Genetic Crossover for the Traveling Salesman Problem (KK, HN), pp. 302–306.
SACSAC-1999-MocellinM #aspect-oriented #behaviour #modelling #multi #using
Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS (FM, HM), pp. 450–454.
SACSAC-1999-Monfroy #constraints #using
Using “Weaker” Functions for Constraint Propagation Over Real Numbers (EM), pp. 553–559.
SACSAC-1999-OgataIF #optimisation #term rewriting #using
Optimizing Term Rewriting Using Discrimination Nets With Specialization (KO, SI, KF), pp. 511–518.
SACSAC-1999-SegarraA #file system #mobile #named #using
MFS: A Mobile File System Using Generic System Services (MTS, FA), pp. 419–420.
SACSAC-1999-Taylor #finite #induction #pattern matching #using
Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique (PAT), pp. 41–45.
ESECESEC-FSE-1999-Bokowski #constraints #java #named
CoffeeStrainer: Statically-Checked Constraints on the Definition and Use of Types in Java (BB), pp. 355–374.
ESECESEC-FSE-1999-GargantiniH #model checking #requirements #specification #testing #using
Using Model Checking to Generate Tests from Requirements Specifications (AG, CLH), pp. 146–162.
ESECESEC-FSE-1999-JagerSW #modelling #process #uml #using
Using UML for Software Process Modeling (DJ, AS, BW), pp. 91–108.
ICSEICSE-1999-AtkinsBGM #tool support #using #version control
Using Version Control Data to Evaluate the Impact of Software Tools (DLA, TB, TLG, AM), pp. 324–333.
ICSEICSE-1999-DangK #mobile #model checking #using
Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
ICSEICSE-1999-DashofyMT #architecture #distributed #middleware #off the shelf #using
Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures (EMD, NM, RNT), pp. 3–12.
ICSEICSE-1999-DeursenK #clustering #concept analysis #identification #using
Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
ICSEICSE-1999-HallHW #approach #deployment #using
A Cooperative Approach to Support Software Deployment Using the Software Dock (RSH, DH, ALW), pp. 174–183.
ICSEICSE-1999-Leinbach #agile #internet #using
Successfully Deliver Internet Applications Using Rapid Software Techniques (CL), pp. 624–625.
ICSEICSE-1999-Magee #analysis #architecture #behaviour #using
Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
ICSEICSE-1999-MaruyamaS #automation #dependence #graph #refactoring #using
Automatic Method Refactoring Using Weighted Dependence Graphs (KM, KS), pp. 236–245.
ICSEICSE-1999-MemonPS #approach #testing #user interface #using
Using a Goal-Driven Approach to Generate Test Cases for GUIs (AMM, MEP, MLS), pp. 257–266.
ICSEICSE-1999-OssherT #development #evolution #object-oriented #problem #programming #using
Using Subject-Oriented Programming to Overcome Common Problems in Object-Oriented Software Development/Evolution (HO, PLT), pp. 687–688.
ICSEICSE-1999-YehL #metric #normalisation #precise #towards #using
Toward Precise Measurements Using Software Normalization (PLY, JCL), pp. 736–737.
HPCAHPCA-1999-CondonHPS #memory management #modelling #using
Using Lamport Clocks to Reason about Relaxed Memory Models (AC, MDH, MP, DJS), pp. 270–278.
HPCAHPCA-1999-KaxirasG #performance #predict #using
Improving CC-NUMA Performance Using Instruction-Based Prediction (SK, JRG), pp. 161–170.
HPDCHPDC-1999-AkarsuFHKKSY #performance #using
Using Gateway System to Provide a Desktop Access to High Performance Computational Resources (EA, GF, TH, AK, KSK, PS, CHY), pp. 294–298.
HPDCHPDC-1999-AllenGMS #distributed #tool support #using
The Cactus Computational Toolkit and using Distributed Computing to Collide Neutron Stars (GA, TG, JM, ES), pp. 57–61.
HPDCHPDC-1999-CoadyOF #clustering #embedded #memory management #network #using
Using Embedded Network Processors to Implement Global Memory Management in a Workstation Cluster (YC, JSO, MJF), pp. 319–328.
HPDCHPDC-1999-ReneP #corba #encapsulation #parallel #using
MPI Code Encapsulating using Parallel CORBA Object (CR, TP), pp. 3–10.
LCTESLCTES-1999-CooperSS #algorithm #optimisation #search-based #using
Optimizing for Reduced Code Space using Genetic Algorithms (KDC, PJS, DS), pp. 1–9.
LCTESLCTES-1999-Engblom #benchmark #embedded #metric #tool support #why
Why SpecInt95 Should Not Be Used to Benchmark Embedded Systems Tools (JE), pp. 96–103.
PPoPPPPoPP-1999-BagrodiaDDP #parallel #performance #predict #scalability #simulation #using
Performance Prediction of Large Parallel Applications using Parallel Simulations (RB, ED, SD, TP), pp. 151–162.
PPoPPPPoPP-1999-SchererLGZ #adaptation #parallel #using
Transparent Adaptive Parallelism on NOWs using OpenMP (AS, HL, TRG, WZ), pp. 96–106.
PPoPPPPoPP-1999-Sundaram-StukelV #analysis #predict #using
Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
SOSPSOSP-1999-GovilTHR #clustering #multi #resource management #using
Cellular Disco: resource management using virtual clusters on shared-memory multiprocessors (KG, DT, YH, MR), pp. 154–169.
CADECADE-1999-FeltyHR #abstraction #syntax #using
Formal Metatheory using Implicit Syntax, and an Application to Data Abstraction for Asynchronous Systems (APF, DJH, AR), pp. 237–251.
CADECADE-1999-GribomontS #using #validation #verification
System Description: Using OBDD’s for the validation of Skolem verification conditions (EPG, NS), pp. 222–226.
CADECADE-1999-HillenbrandJL #performance
System Description: Waldmeister — Improvements in Performance and Ease of Use (TH, AJ, BL), pp. 232–236.
CAVCAV-1999-BehrmannLPWY #analysis #diagrams #difference #performance #reachability #using
Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
CAVCAV-1999-BiereCRZ #model checking #safety #using
Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs (AB, EMC, RR, YZ), pp. 60–71.
CAVCAV-1999-RameshB #case study #design #pipes and filters #tool support #using #validation
Validation of Pipelined Processor Designs Using Esterel Tools: A Case Study (SR, PB), pp. 84–95.
CSLCSL-1999-AltenkirchR #induction #monad #using
Monadic Presentations of λ Terms Using Generalized Inductive Types (TA, BR), pp. 453–468.
CSLCSL-1999-Bonelli #using
Using Fields and Explicit Substitutions to Implement Objects and Functions in a de Bruijn Setting (EB), pp. 204–219.
CSLCSL-1999-Howe #interactive #proving #theorem proving #type system #using
Interactive Theorem Proving Using Type Theory (DJH), p. 578.
ICLPICLP-1999-CarroH #concurrent #database #prolog #thread #using
Concurrency in Prolog Using Threads and a Shared Database (MC, MVH), pp. 320–334.
ICLPICLP-1999-HermenegildoBPL #debugging #optimisation #preprocessor #program analysis #using
Program Analysis, Debugging, and Optimization Using the Ciao System Preprocessor (MVH, FB, GP, PLG), pp. 52–66.
ICLPICLP-1999-MarinoM #functional #logic programming #source code #static analysis #using
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), p. 614.
ICTSSIWTCS-1999-ProbertW #functional #generative #performance #testing #using
Fast Functional Test Generation Using an SDL Model (RLP, AWW), pp. 299–316.
ASEASE-1998-Andrews #analysis #testing #tool support #using
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
ASEASE-1998-HazelST #animation #requirements #specification #using #verification
Requirements Engineering and Verification using Specification Animation (DH, PAS, OT), pp. 302–305.
ASEASE-1998-MaoSL #case study #machine learning #reuse #using #verification
Reusability Hypothesis Verification using Machine Learning Techniques: A Case Study (YM, HAS, HL), pp. 84–93.
ASEASE-1998-WielsE #category theory #evolution #specification #using
Management of Evolving Specifications using Category Theory (VW, SME), pp. 12–21.
DACDAC-1998-AmonBL #using
Making Complex Timing Relationships Readable: Presburger Formula Simplicication Using Don’t Cares (TA, GB, JL), pp. 586–590.
DACDAC-1998-AzizKS #hybrid #simulation #using #verification
Hybrid Verification Using Saturated Simulation (AA, JHK, TRS), pp. 615–618.
DACDAC-1998-FallahDK #functional #generative #linear #modelling #programming #satisfiability #using
Functional Vector Generation for HDL Models Using Linear Programming and 3-Satisfiability (FF, SD, KK), pp. 528–533.
DACDAC-1998-FangW #clustering #functional #multi #replication #using
Performance-Driven Multi-FPGA Partitioning Using Functional Clustering and Replication (WJF, ACHW), pp. 283–286.
DACDAC-1998-GovindarajuDHH #approximate #reachability #using
Approximate Reachability with BDDs Using Overlapping Projections (SGG, DLD, AJH, MH), pp. 451–456.
DACDAC-1998-HoltmannB #compilation #design #protocol #using
Design of a SPDIF Receiver Using Protocol Compiler (UH, PB), pp. 794–799.
DACDAC-1998-HwangCH #approach #design #power management #re-engineering #using
A Re-engineering Approach to Low Power FPGA Design Using SPFD (JMH, FYC, TH), pp. 722–725.
DACDAC-1998-KimJT #optimisation #using
Arithmetic Optimization Using Carry-Save-Adders (TK, WJ, SWKT), pp. 433–438.
DACDAC-1998-MurgaiFO #using
Using Complementation and Resequencing to Minimize Transitions (RM, MF, ALO), pp. 694–697.
DACDAC-1998-PardoH #incremental #model checking #using
Incremental CTL Model Checking Using BDD Subsetting (AP, GDH), pp. 457–462.
DACDAC-1998-QiuWP #estimation #order #statistics #using
Maximum Power Estimation Using the Limiting Distributions of Extreme Order Statistics (QQ, QW, MP), pp. 684–689.
DACDAC-1998-RaelRA #design
Design Methodology Used in a Single-Chip CMOS 900 MHz Spread-Spectrum Wireless Transceiver (JR, AR, AAA), pp. 44–49.
DACDAC-1998-SuttonSR #multi #using
A Multiprocessor DSP System Using PADDI-2 (RAS, VPS, JMR), pp. 62–65.
DACDAC-1998-TarafdarL #data transfer #synthesis #using
The DT-Model: High-Level Synthesis Using Data Transfers (ST, ML), pp. 114–117.
DACDAC-1998-WangAK #array #automation #evaluation #generative #using #verification
Automatic Generation of Assertions for Formal Verification of PowerPC Microprocessor Arrays Using Symbolic Trajectory Evaluation (LCW, MSA, NK), pp. 534–537.
DACDAC-1998-YoungMSTHN #design #embedded #java #refinement #specification #using
Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement (JSY, JM, MS, AT, PNH, ARN), pp. 70–75.
DACDAC-1998-ZhongAMM #case study #configuration management #problem #satisfiability #using
Using Reconfigurable Computing Techniques to Accelerate Problems in the CAD Domain: A Case Study with Boolean Satisfiability (PZ, PA, SM, MM), pp. 194–199.
DATEDATE-1998-FreundF #approximate #linear #modelling #multi #scalability #using
Reduced-Order Modeling of Large Linear Passive Multi-Terminal Circuits Using Matrix-Pade Approximation (RWF, PF), pp. 530–537.
DATEDATE-1998-HansenKR #comparison #interface #simulation #synthesis #using #verification
Verification by Simulation Comparison using Interface Synthesis (CH, AK, WR), pp. 436–443.
DATEDATE-1998-PomeranzR98a #using
Design-for-Testability for Synchronous Sequential Circuits using Locally Available Lines (IP, SMR), pp. 983–984.
DATEDATE-1998-RingeLB #satisfiability #using #verification
Path Verification Using Boolean Satisfiability (MR, TL, EB), pp. 965–966.
DATEDATE-1998-RudnickVECPR #generative #performance #testing #using
Fast Sequential Circuit Test Generation Using High-Level and Gate-Level Techniques (EMR, RV, AE, FC, PP, MSR), pp. 570–576.
DATEDATE-1998-ShaoC #approximate #design #using
MCM Interconnect Design Using Two-Pole Approximation (JS, RMMC), pp. 544–548.
DATEDATE-1998-UrrizaAGBN #architecture #image #using
VLSI Architecture for Lossless Compression of Medical Images Using the Discrete Wavelet Transform (IU, JIA, JIGN, LAB, DN), pp. 196–201.
DATEDATE-1998-Velasco-MedinaCN #detection #fault #injection #linear #using
Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
DATEDATE-1998-VercauterenVJL #analysis #partial order #performance #using #verification
Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
HTHT-1998-Moulthrop
Straight Talk for Troubled Times, Or: The Street Finds Its Uses for Things (SM), p. 306.
HTHT-1998-ShipmanFBCH #adaptation #case study #experience #using
Using Paths in the Classroom: Experiences and Adaptations (FMSI, RF, DB, CCC, HwH), pp. 267–270.
HTHT-1998-WiilO #hypermedia #taxonomy #using
Using the Flag Taxonomy to Study Hypermedia System Interoperabilty (UKW, ), pp. 188–197.
PODSPODS-1998-AbiteboulD #complexity #query #using
Complexity of Answering Queries Using Materialized Views (SA, OMD), pp. 254–263.
SIGMODSIGMOD-1998-ChakrabartiDI #categorisation #hypermedia #using
Enhanced Hypertext Categorization Using Hyperlinks (SC, BD, PI), pp. 307–318.
SIGMODSIGMOD-1998-Cohen #database #integration #query #semistructured data #similarity #using
Integration of Heterogeneous Databases Without Common Domains Using Queries Based on Textual Similarity (WWC), pp. 201–212.
SIGMODSIGMOD-1998-Cohen98a #query #similarity #using #web
Providing Database-like Access to the Web Using Queries Based on Textual Similarity (WWC), pp. 558–560.
SIGMODSIGMOD-1998-DeshpandeRSN #multi #query #using
Caching Multidimensional Queries Using Chunks (PD, KR, AS, JFN), pp. 259–270.
SIGMODSIGMOD-1998-Miller #using
Using Schematically Heterogeneous Structures (RJM), pp. 189–200.
SIGMODSIGMOD-1998-PapadopoulosM #array #query #similarity #using
Similarity Query Processing Using Disk Arrays (AP, YM), pp. 225–236.
SIGMODSIGMOD-1998-SubramanianV #cost analysis #optimisation #query #using
Cost-Based Optimization of Decision Support Queries Using Transient Views (SNS, SV), pp. 319–330.
VLDBVLDB-1998-AnkerstBKS #adaptation #approximate #query #similarity #using
Improving Adaptable Similarity Query Processing by Using Approximations (MA, BB, HPK, TS), pp. 206–217.
VLDBVLDB-1998-ChakrabartiSD #mining #using
Mining Surprising Patterns Using Temporal Description Length (SC, SS, BD), pp. 606–617.
VLDBVLDB-1998-DarEGP #database #using
DTL’s DataSpot: Database Exploration Using Plain Language (SD, GE, SG, EP), pp. 645–649.
VLDBVLDB-1998-MiloZ #semistructured data #using
Using Schema Matching to Simplify Heterogeneous Data Translation (TM, SZ), pp. 122–133.
ITiCSEITiCSE-1998-BouletJB #education #modelling #process #student #using
Teaching process modelling to undergraduate computer students: effects of using Lotus Notes and television programmes (MMB, FBJ, SB), pp. 32–36.
ITiCSEITiCSE-1998-CarboneK #bibliography #education
A survey of methods used to evaluate computer science teaching (AC, JK), pp. 41–45.
ITiCSEITiCSE-1998-Ellis #development #internet #learning #multi #problem
Group 1 (working group): development and use of multimedia and Internet resources for a problem based learning environment (AE), p. 269.
ITiCSEITiCSE-1998-Ellis98a #multi #tutorial #web
Use of multimedia and World Wide Web resources in a traditional lecture/tutorial environment (poster) (AE), p. 279.
ITiCSEITiCSE-1998-FernandezR #object-oriented #using #visualisation
Using visualisation to improve object-oriented thinking (poster) (AF, GR), p. 280.
ITiCSEITiCSE-1998-FincherP #experience #towards #using
Beyond anecdote towards real transfer: using other institutions’ experience of project work (SF, MP), pp. 86–89.
ITiCSEITiCSE-1998-Grove #motivation #process #programming #using
Using the personal software process to motivate good programming practices (RFG), pp. 98–101.
ITiCSEITiCSE-1998-JohnsonLHSFDM #collaboration #using
Virtual office hours using TechTalk, a Web-based mathematical collaboration tool (JRJ, YNL, TTH, TS, TF, SD, PM), pp. 130–133.
ITiCSEITiCSE-1998-Marshall #education #internet #using
Using the Internet to teach the Internet (DM), pp. 171–174.
ITiCSEITiCSE-1998-McNally #image #using
Using image processing as a laboratory theme in CS1 and CS2 (poster) (MFM), p. 292.
ITiCSEITiCSE-1998-RoantreeK #automation #using #web
Automated collection of coursework using the Web (MR, TEK), pp. 206–208.
ITiCSEITiCSE-1998-Roberts #education #using
Strategies for using technology in the teaching of ethics (ER), pp. 209–212.
ITiCSEITiCSE-1998-RosbottomM #education #using
Using intelligent agents to change the delivery of education (poster) (JR, CM), p. 303.
ITiCSEITiCSE-1998-Scoy #programming language #using
Using the BURKS 2 CD-ROM in a principles of programming languages course (FLVS), pp. 239–242.
ITiCSEITiCSE-1998-Smith
Structuring team communications with targeted use of groupware (poster) (MS), p. 306.
ITiCSEITiCSE-1998-TiwariH #collaboration #learning #student #using
Learning groupware through using groupware-computer supported collaborative learning with face to face students (AT, CH), pp. 236–238.
TACASTACAS-1998-DawsT #abstraction #model checking #reachability #realtime #using
Model Checking of Real-Time Reachability Properties Using Abstractions (CD, ST), pp. 313–329.
TACASTACAS-1998-Grahlmann #automaton #finite #parallel #petri net #source code #using
Combining Finite Automata, Parallel Programs and SDL Using Petri Nets (BG), pp. 102–117.
TACASTACAS-1998-JensenL #abstraction #algorithm #proving #using
A Proof of Burns N-Process Mutual Exclusion Algorithm Using Abstraction (HEJ, NAL), pp. 409–423.
TACASTACAS-1998-Lind-NielsenABHKL #analysis #composition #dependence #scalability #using #verification
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
TACASTACAS-1998-StevensS #game studies #model checking #using
Practical Model-Checking Using Games (PS, CS), pp. 85–101.
WRLAWRLA-1998-BorovanskyC #constraints #process #theorem proving #using
Cooperation of constraint solvers: using the new process control facilities of ELAN (PB, CC), pp. 1–20.
CSMRCSMR-1998-KirnerG #re-engineering #specification #using
System Specification Reengineering Using the SpecView Tool (TGK, RCG), pp. 135–141.
CSMRCSMR-1998-Kleuker #distributed #formal method #re-engineering #using
Reengineering of Distributed Systems Using Formal Methods (SK), pp. 189–192.
ICSMEICSM-1998-BaxterYMSB #abstract syntax tree #clone detection #detection #syntax #using
Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
ICSMEICSM-1998-BurdM #approach #clustering #component #evolution #maintenance #re-engineering #using
Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering (EB, MM), pp. 199–207.
ICSMEICSM-1998-HarmanSD #analysis #memory management #slicing #using
Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
ICSMEICSM-1998-LiangH #dependence #graph #slicing #using
Slicing Objects Using System Dependence Graphs (DL, MJH), pp. 358–367.
ICSMEICSM-1998-OcaC #data mining #identification #mining #using
Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
ICSMEICSM-1998-Pearse #evolution #metric #using
Using Software Metrics to Control Firmware Evolution (TTP), pp. 72–73.
ICSMEICSM-1998-Tonella #diagrams #encapsulation #memory management #using
Using the O-A Diagram to Encapsulate Dynamic Memory Access (PT), pp. 326–335.
IWPCIWPC-1998-MancoridisMRCG #automation #clustering #source code #using
Using Automatic Clustering to Produce High-Level System Organizations of Source Code (SM, BSM, CR, YFC, ERG), pp. 45–52.
WCREWCRE-1998-Holt #algebra #architecture #relational #using
Structural Manipulations of Software Architecture using Tarski Relational Algebra (RCH), pp. 210–219.
WCREWCRE-1998-PenteadoMP #legacy #object-oriented #paradigm #re-engineering #using
Reengineering of Legacy Systems Based on Transformation Using the Object-Oriented Paradigm (RP, PCM, AFdP), pp. 144–153.
PLDIPLDI-1998-AdveM #integer #optimisation #program analysis #set #using
Using Integer Sets for Data-Parallel Program Analysis and Optimization (VSA, JMMC), pp. 186–198.
PLDIPLDI-1998-HastiH #analysis #pointer #using
Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
SASSAS-1998-HandjievaT #analysis #clustering #control flow #using
Refining Static Analyses by Trace-Based Partitioning Using Control Flow (MH, ST), pp. 200–214.
STOCSTOC-1998-LubyMSS #analysis #design #graph #using
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
CIAAWIA-1998-LHerPM #automaton #proving #source code #using
Proving Sequential Function Chart Programs Using Automata (DL, PLP, LM), pp. 149–163.
CIAAWIA-1998-Nykanen #transducer #using
Using Acceptors as Transducers (MN), pp. 133–148.
FMFM-1998-Borger #analysis #design #state machine #using
High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
FMFM-1998-KoobUW #formal method #modelling #policy #process #security #topic #using
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
AFPAFP-1998-Sheard98 #ml #programming language #staged #using
Using MetaML: A Staged Programming Language (TS), pp. 207–239.
ICGTTAGT-1998-Faulstich #graph transformation #using
Using Graph Transformation Techniques for Integrating Information from the WWW (LF), pp. 426–441.
ICGTTAGT-1998-Hrischuk #automation #graph grammar #process #using
A Model Making Automation Process (MMAP) Using a Graph Grammar Formalism (CEH), pp. 442–454.
CHICHI-1998-AltyR #communication #music #using #visual notation
Communicating Graphical Information to Blind Users Using Music: The Role of Context (JLA, DIR), pp. 574–581.
CHICHI-1998-ChristelSTW #abstraction #evolution #multi #video
Evolving Video Skims into Useful Multimedia Abstractions (MGC, MAS, CRT, DBW), pp. 171–178.
CHICHI-1998-KrautMSKS #communication #internet
Communication and Information: Alternative Uses of the Internet in Households (REK, TM, JS, SBK, WLS), pp. 368–375.
CHICHI-1998-OHaraSNS #documentation #library #student
Student Readers’ Use of Library Documents: Implications for Library Technologies (KO, FS, WMN, AS), pp. 233–240.
CHICHI-1998-Pirolli #design #information management #trade-off #using
Exploring Browser Design Trade-Offs Using a Dynamical Model of Optimal Information Foraging (PP), pp. 33–40.
CHICHI-1998-PlanteTI #interactive #using
Evaluating the Location of Hot Spots in Interactive Scenes Using the 3R Toolbox (AP, ST, SI), pp. 117–123.
CHICHI-1998-PlesniakP #artificial reality #using #video
Coincident Display Using Haptics and Holographic Video (WP, RP), pp. 304–311.
CHICHI-1998-RisdenCWHKHML #effectiveness #interactive
Interactive Advertising: Patterns of Use and Effectiveness (KR, MC, SW, LH, JK, HGH, NM, EL), pp. 219–224.
CSCWCSCW-1998-KobayashiSSTDW #collaboration #using #web
Collaborative Customer Services Using Synchronous Web Browser Sharing (MK, MS, TS, MT, SD, CGW), pp. 99–109.
CSCWCSCW-1998-MorikawaM #communication #named #towards #video
HyperMirror: Toward Pleasant-to-Use Video Mediated Communication System (OM, TM), pp. 149–158.
CSCWCSCW-1998-MyersSG #collaboration #multi #using
Collaboration Using Multiple PDAs Connected to a PC (BAM, HS, RG), pp. 285–294.
CSCWCSCW-1998-PrinzMP #design
Designing Groupware for Congruency in Use (WP, GM, UPB), pp. 373–382.
CSCWCSCW-1998-SarwarKBHMR #collaboration #predict #quality #research #using
Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System (BMS, JAK, AB, JLH, BNM, JR), pp. 345–354.
AdaEuropeAdaEurope-1998-HarbourRGG #ada #execution #implementation #realtime #using
Implementing and Using Execution Time Clocks in Ada Hard Real-Time Applications (MGH, MAR, JJGG, JCPG), pp. 90–101.
AdaEuropeAdaEurope-1998-Saaltink #ada
Guidance on the Use of Ada95 in High Integrity Systems (SM, MS), pp. 276–287.
AdaSIGAda-1998-BarkatakiHD #design pattern #legacy #object-oriented #re-engineering #using
Reengineering a Legacy System Using Design Patterns and Ada-95 Object-Oriented Features (SB, SH, TD), pp. 148–152.
AdaSIGAda-1998-ChamillardLY #ada #using
Using Ada in Non-CS Majors (ATC, RJL, RRY), pp. 61–67.
AdaSIGAda-1998-DousetteDJ #using #web
Command and Control Using World Wide Web Technology (PJD, AD, MJ), pp. 212–214.
AdaSIGAda-1998-Flint #ada #api #compilation #java #using
Using Java APIs with Native Ada Compilers (SF), pp. 193–203.
AdaSIGAda-1998-HopperBHH #ada #simulation
Use of Ada in Digital Radar Landmass Simulation (DRLMS) (JH, JDB, HH, TH), pp. 137–139.
AdaSIGAda-1998-James #ada #data flow #distributed #evolution #using
The Evolution of a Distributed dataflow Processing Model Using Ada (SJ), pp. 39–44.
AdaSIGAda-1998-TardieuP #distributed #fault tolerance #multi #using
Building Fault Tolerant Distributed Systems Using IP Multicast (ST, LP), pp. 45–51.
AdaSIGAda-1998-WoodruffA #ada #distributed #research #scalability #using
A Large Distributed Control System Using Ada in Fusion Research (JPW, PJVA), pp. 121–131.
CAiSECAiSE-1998-Dahchour #approach #formal method #using
Formalizing Materialization Using a Metaclass Approach (MD), pp. 401–421.
CAiSECAiSE-1998-HarrisonL #automation #information management #legacy #reverse engineering #using
Automated Reverse Engineering of Legacy 4GL Information System Applications Using the ITOC Workbench (JVH, WML), pp. 41–57.
CAiSECAiSE-1998-NurcanGS #approach #case study #process
Describing Business Processes with a Guided Use Case Approach (SN, GG, CS), pp. 339–362.
EDOCEDOC-1998-Iyengar #architecture #repository #uml #using
A universal repository architecture using the OMG UML and MOF (SSI), pp. 35–44.
EDOCEDOC-1998-Kobryn #architecture #enterprise #modelling #uml #using
Modeling enterprise software architectures using UML (CK), pp. 25–34.
ECIRACIR-1998-OunisP #concept #effectiveness #graph #performance #query #relational #using
Effective and Efficient Relational Query Processing Using Conceptual Graphs (IO, MP).
ECIRACIR-1998-TheophylactouL #documentation #retrieval #using
A Dempster-Shafer Model for Document Retrieval using Noun Phrases (MT, ML).
CIKMCIKM-1998-DanielsR #using
Locating Passages Using a Case-Based of Excerpts (JJD, ELR), pp. 38–44.
CIKMCIKM-1998-PapkaA #classification #documentation #multi #using
Document Classification Using Multiword Features (RP, JA), pp. 124–131.
CIKMCIKM-1998-Tang #incremental #performance #using
Using Incremental Pruning to Increase the Efficiency of Dynamic Itemset Counting for Association Rules (JT), pp. 273–280.
CIKMCIKM-1998-TungTL #mining #named #online #optimisation #using
BROOM: Buffer Replacement using Online Optimization by Mining (AKHT, YCT, HL), pp. 185–192.
ICMLICML-1998-AbeM #learning #query #using
Query Learning Strategies Using Boosting and Bagging (NA, HM), pp. 1–9.
ICMLICML-1998-FrankW98a #mutation testing #permutation #using
Using a Permutation Test for Attribute Selection in Decision Trees (EF, IHW), pp. 152–160.
ICMLICML-1998-KimuraK #algorithm #analysis #learning #using
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
ICMLICML-1998-KollerF #approximate #learning #probability #process #using
Using Learning for Approximation in Stochastic Processes (DK, RF), pp. 287–295.
ICMLICML-1998-LochS #markov #policy #process #using
Using Eligibility Traces to Find the Best Memoryless Policy in Partially Observable Markov Decision Processes (JL, SPS), pp. 323–331.
ICMLICML-1998-McCluskeyW #case study #requirements #validation
A Case Study in the Use of Theory Revision in Requirements Validation (TLM, MMW), pp. 368–376.
ICMLICML-1998-NakamuraA #algorithm #collaboration #predict #using
Collaborative Filtering Using Weighted Majority Prediction Algorithms (AN, NA), pp. 395–403.
ICMLICML-1998-PrecupU #approximate #classification #using
Classification Using Phi-Machines and Constructive Function Approximation (DP, PEU), pp. 439–444.
ICMLICML-1998-RandlovA #learning #using
Learning to Drive a Bicycle Using Reinforcement Learning and Shaping (JR, PA), pp. 463–471.
ICMLICML-1998-RyanP #architecture #composition #learning #named
RL-TOPS: An Architecture for Modularity and Re-Use in Reinforcement Learning (MRKR, MDP), pp. 481–487.
ICPRICPR-1998-AdigaC #image #segmentation #using
Segmentation of volumetric histo-pathological images by surface following using constrained snakes (PSUA, BBC), pp. 1674–1676.
ICPRICPR-1998-AeberhardV #image #multi #recognition #using
Face recognition using multiple image view line segments (SA, OYdV), pp. 1198–1200.
ICPRICPR-1998-AhrnsN #realtime #similarity #using
Real-time monocular fixation control using the log-polar transformation and a confidence-based similarity measure (IA, HN), pp. 310–315.
ICPRICPR-1998-AiharaIYT #image #self #using
Memory-based self-localization using omnidirectional images (NA, HI, NY, HT), pp. 1799–1803.
ICPRICPR-1998-ArakiMTY #image #multi #realtime #robust #sequence #statistics #using
Real-time tracking of multiple moving objects in moving camera image sequences using robust statistics (SA, TM, HT, NY), pp. 1433–1435.
ICPRICPR-1998-ArikiS #classification #multi #using
Classification of TV sports news by DCT features using multiple subspace method (YA, YS), pp. 1488–1491.
ICPRICPR-1998-Aviles-Cruz #algorithm #data fusion #probability #segmentation #using
Unsupervised texture segmentation using stochastic version of the EM algorithm and data fusion (CAC), pp. 1005–1009.
ICPRICPR-1998-BoccignoneCP #detection #using
Small target detection using wavelets (GB, AC, AP), pp. 1776–1778.
ICPRICPR-1998-ChenL #algorithm #documentation #using
Field-data grouping for form document processing using a gravitation-based algorithm (JLC, HJL), pp. 1095–1097.
ICPRICPR-1998-CheungI #detection #symmetry #using
Symmetry detection using complex moments (KKTC, HHSI), pp. 1473–1475.
ICPRICPR-1998-CinqueLLT #image #retrieval #using
Retrieval of images using rich region descriptions (LC, FL, SL, SLT), pp. 899–901.
ICPRICPR-1998-CracknellD #comprehension #documentation #image #using
Document image understanding of handwritten forms using rule-trees (CC, ACD), pp. 936–938.
ICPRICPR-1998-DanielssonLY #3d #segmentation #using
Segmentation of 3D volumes using second derivatives (PED, QL, QZY), pp. 248–251.
ICPRICPR-1998-DayP #learning #modelling
A projection filter for use with parameterised learning models (MJSD, JSP), pp. 867–869.
ICPRICPR-1998-EglinBE #complexity #using #visual notation
Printed text featuring using the visual criteria of legibility and complexity (VE, SB, HE), pp. 942–944.
ICPRICPR-1998-FanC #documentation #identification #using
Form document identification using line structure based features (KCF, MLC), pp. 1098–1100.
ICPRICPR-1998-FerriMAS #algorithm #estimation #using
Variable-size block matching algorithm for motion estimation using a perceptual-based splitting criterion (FJF, JM, JVA, JS), pp. 286–288.
ICPRICPR-1998-FlorebySS #bound #fourier #image #order #using
Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
ICPRICPR-1998-FrydendalJ #graph #image #segmentation #using
Segmentation of sugar beets using image and graph processing (IF, RJ), pp. 1697–1699.
ICPRICPR-1998-Garcia-SevillaP #analysis #image
The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
ICPRICPR-1998-Gavrila #distance #multi #using
Multi-feature hierarchical template matching using distance transforms (DMG), pp. 439–444.
ICPRICPR-1998-GiacconeGJ #estimation #using
Creating virtual scenes using active contours and global motion estimation (PRG, DG, GAJ), pp. 1505–1507.
ICPRICPR-1998-GoktepeAYY #image #markov #modelling #random #segmentation #using
Unsupervised texture based image segmentation by simulated annealing using Markov random field and Potts models (MG, VA, NY, CY), pp. 820–822.
ICPRICPR-1998-Govindu0C #geometry #image #using
Using geometric properties for correspondence-less image alignment (VG, CS, RC), pp. 37–41.
ICPRICPR-1998-GroweT #3d #evaluation #image
Use of explicit knowledge and GIS data for the 3D evaluation of remote sensing images (SG, RT), pp. 1413–1415.
ICPRICPR-1998-GuKTH #image #robust #using
Robust extraction of characters from color scene image using mathematical morphology (LG, TK, NT, RMH), pp. 1002–1004.
ICPRICPR-1998-HaritaogluHD #named #using
Ghost: a human body part labeling system using silhouettes (IH, DH, LSD), pp. 77–82.
ICPRICPR-1998-HattoriMS #image #symmetry #using
Estimating pose of human face based on symmetry plane using range and intensity images (KH, SM, YS), pp. 1183–1187.
ICPRICPR-1998-HeisterkampB #recognition #using
Object and motion recognition using the plane plus parallax displacement of conics (DRH, PB), pp. 751–753.
ICPRICPR-1998-Henry #modelling
Use of an evolutive base of models in a system for reading printed texts (JLH), pp. 802–804.
ICPRICPR-1998-HeydenK #constraints #re-engineering #using
Reconstruction from affine cameras using closure constraints (AH, FK), pp. 47–50.
ICPRICPR-1998-HjaltasonRSW #modelling #ranking #recognition #sorting #using
Using spatial sorting and ranking in model-based object recognition (GRH, MR, HS, IW), pp. 1347–1349.
ICPRICPR-1998-HofmanJ #analysis #approach #clustering #performance #robust #using
Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
ICPRICPR-1998-HuangSW #using
Face pose discrimination using support vector machines (SVM) (JH, XS, HW), pp. 154–156.
ICPRICPR-1998-HungYCHF #pointer
Free-hand pointer by use of an active stereo vision system (YPH, YSY, YSC, IBH, CSF), pp. 1244–1246.
ICPRICPR-1998-HwangYTY #3d #linear #using
A factorization method using 3D linear combination for shape and motion recovery (KCH, NY, HT, KY), pp. 959–963.
ICPRICPR-1998-IshiiMT #detection #image #realtime #using #video
Detection of foreign substances mixed in a plastic bottle of medicinal solution using real-time video image processing (AI, TM, ST), pp. 1646–1650.
ICPRICPR-1998-JainHK #identification #named #using
F2ID: a personal identification system using faces and fingerprints (AKJ, LH, YK), pp. 1373–1375.
ICPRICPR-1998-KamataNB #image #using
Color image compression using a Hilbert scan (SiK, TNN, YB), pp. 1575–1578.
ICPRICPR-1998-KamathKDD #image #markov #modelling #segmentation #using
Joint segmentation and image interpretation using hidden Markov models (NK, KSK, UBD, RD), pp. 1840–1842.
ICPRICPR-1998-KanekoH #detection #using #video
Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
ICPRICPR-1998-KangOC #3d #graph #using
Character grouping technique using 3D neighborhood graphs in raster map (YBK, SYO, HGC), pp. 1092–1094.
ICPRICPR-1998-KaufmannB #fault #locality #using
Amount translation and error localization in check processing using syntax-directed translation (GK, HB), pp. 1530–1534.
ICPRICPR-1998-KawaguchiN #algorithm #detection #search-based #using
Ellipse detection using a genetic algorithm (TK, RiN), pp. 141–145.
ICPRICPR-1998-KawaiUIST #using
Stereo correspondence using segment connectivity (YK, TU, YI, YS, FT), pp. 648–651.
ICPRICPR-1998-KawanishiYITY #generative #image #using
Generation of high-resolution stereo panoramic images by omnidirectional imaging sensor using hexagonal pyramidal mirrors (TK, KY, HI, HT, NY), pp. 485–489.
ICPRICPR-1998-KawasueSI #using
Range finder using circular dynamic stereo (KK, OS, TI), pp. 774–776.
ICPRICPR-1998-KawataNOKMEKM #analysis #image #using
Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
ICPRICPR-1998-KeeniNS #automation #classification #estimation #generative #network #using
Automatic generation of initial weights and estimation of hidden units for pattern classification using neural networks (KK, KN, HS), pp. 1568–1571.
ICPRICPR-1998-KimuraIWTM #network #recognition #using
Handwritten numeral recognition using autoassociative neural networks (FK, SI, TW, ST, YM), pp. 166–171.
ICPRICPR-1998-KogaKSF #analysis #segmentation #using
Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
ICPRICPR-1998-KosmalaR #online #recognition #statistics #using
On-line handwritten formula recognition using statistical methods (AK, GR), pp. 1306–1308.
ICPRICPR-1998-KosmalaR98a #clustering #online #recognition #scalability #self #using
Tree-based state clustering using self-organizing principles for large vocabulary on-line handwriting recognition (AK, GR), pp. 1313–1315.
ICPRICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-LengagneFM #3d #constraints #difference #using
Using differential constraints to generate a 3D face model from stereo (RL, PF, OM), pp. 637–639.
ICPRICPR-1998-LiML #estimation #multi #recognition #using
Human posture recognition using multi-scale morphological method and Kalman motion estimation (YL, SM, HL), pp. 175–177.
ICPRICPR-1998-LiQ #image #retrieval #using
Matching spatial relations using DB-tree for image retrieval (XL, XQ), pp. 1230–1234.
ICPRICPR-1998-LiuH #recognition #using
Using centroid covariance in target recognition (GL, RMH), pp. 1343–1346.
ICPRICPR-1998-LuoCH #detection #using
Corner detection using vector potential (BL, ADJC, ERH), pp. 1018–1021.
ICPRICPR-1998-MaedaKIZ #analysis #multi #using
Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
ICPRICPR-1998-MaedaNMSS #fuzzy #image #segmentation #using
Fuzzy region-growing segmentation of natural images using local fractal dimension (JM, SN, AM, SS, YS), pp. 991–993.
ICPRICPR-1998-MagareyD #image #multi #using
Multiresolution stereo image matching using complex wavelets (JM, ARD), pp. 4–7.
ICPRICPR-1998-MasakiYKK #interactive #using #video
Interactive manipulation through augmented virtuality using processed video contents (TM, TY, YK, FK), pp. 1219–1222.
ICPRICPR-1998-MatsuoKI #energy #multi #using
Multi-scale and hierarchical description using energy controlled active balloon model (HM, MK, AI), pp. 205–209.
ICPRICPR-1998-MelzerKZ #approach #detection #modelling #parametricity #using
Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
ICPRICPR-1998-MinMK #recognition #using
Recognition using labelled objects (SLM, JM, JK), pp. 1336–1338.
ICPRICPR-1998-MokhtariB #constant #multi #using
Multiscale compression of planar curves using constant curvature segments (MM, RB), pp. 744–746.
ICPRICPR-1998-MoriKTS #graph #using #visualisation
Visualization of the structure of classes using a graph (YM, MK, JT, MS), pp. 1724–1727.
ICPRICPR-1998-MullerH #recognition
The use of eigenpictures for optical character recognition (NM, BMH), pp. 1124–1126.
ICPRICPR-1998-Nakajima #image #using #visual notation
Extraction of salient apexes from an image by using the function at the primary visual cortex (CN), pp. 720–724.
ICPRICPR-1998-NakamuraEIH #algorithm #using
Skeleton revision algorithm using maximal circles (TN, HE, HI, LH), pp. 1607–1609.
ICPRICPR-1998-NakamuraSO #estimation #using
Object arrangement estimation using color edge profile (YN, NS, YO), pp. 754–758.
ICPRICPR-1998-NakazawaKI #distributed #using
Human tracking using distributed vision systems (AN, HK, SI), pp. 593–596.
ICPRICPR-1998-NieuwoudtB #classification #performance #using
Relative performance of correlation-based and feature-based classifiers of aircraft using radar range profiles (CN, ECB), pp. 1828–1832.
ICPRICPR-1998-NishikawaOM #3d #using
Selective acquisition of 3-D information enough for finding passable free spaces using an active stereo vision system (AN, AO, FM), pp. 857–861.
ICPRICPR-1998-OhLS #analysis #using
Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
ICPRICPR-1998-OhtaSN #feature model #modelling #recognition #using
Recognition of facial expressions using muscle-based feature models (HO, HS, HN), pp. 1379–1381.
ICPRICPR-1998-OkataniD #identification #invariant #on the #problem #using
On identification of singular points using photometric invariants for global shape from shading problem (TO, KD), pp. 1787–1790.
ICPRICPR-1998-OkumaKTY #artificial reality #realtime #using
An augmented reality system using a real-time vision based registration (TO, KK, HT, NY), pp. 1226–1229.
ICPRICPR-1998-OkutomiN #image #using
Extraction of road region using stereo images (MO, SN), pp. 853–856.
ICPRICPR-1998-OngM #robust #segmentation #using
Robust color segmentation using the dichromatic reflection model (CKO, TM), pp. 780–784.
ICPRICPR-1998-OnoeYYT #monitoring #using #video #visual notation
Visual surveillance and monitoring system using an omnidirectional video camera (YO, NY, KY, HT), pp. 588–592.
ICPRICPR-1998-PalubinskasDK #clustering #using
An unsupervised clustering method using the entropy minimization (GP, XD, FK), pp. 1816–1818.
ICPRICPR-1998-ProcterIE #markov #modelling #recognition #string #using
The recognition of handwritten digit strings of unknown length using hidden Markov models (SP, JI, AJE), pp. 1515–1517.
ICPRICPR-1998-SablatnigKZ #classification #modelling #using
Hierarchical classification of paintings using face- and brush stroke models (RS, PK, EZ), pp. 172–174.
ICPRICPR-1998-SardoK #complexity #estimation #using #validation
Model complexity validation for PDF estimation using Gaussian mixtures (LS, JK), pp. 195–197.
ICPRICPR-1998-SatoY #classification #learning #using
A formulation of learning vector quantization using a new misclassification measure (AS, KY), pp. 322–325.
ICPRICPR-1998-SattarT #approach #documentation #fuzzy #image #logic #multi #on the #using
On the multiresolution enhancement of document images using fuzzy logic approach (FS, DBHT), pp. 939–941.
ICPRICPR-1998-SchaufAH #modelling #recognition #recursion #using
Model-based shape recognition using recursive mathematical morphology (MLS, SA, RMH), pp. 202–204.
ICPRICPR-1998-SeemannT #image #segmentation #using
Structure preserving noise filtering of images using explicit local segmentation (TS, PET), pp. 1610–1612.
ICPRICPR-1998-Shevlin #analysis #problem #using
Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
ICPRICPR-1998-ShikuKN #string #using
A method for character string extraction using local and global segment crowdedness (OS, KK, AN), pp. 1077–1080.
ICPRICPR-1998-Sluzek #multi #segmentation #using
Multi-level contour segmentation using multiple segmentation primitives (AS), pp. 741–743.
ICPRICPR-1998-SmithL #segmentation #using
Texture segmentation using zero crossings information (GS, DL), pp. 262–264.
ICPRICPR-1998-SofferS #similarity #using
Using negative shape features for logo similarity matching (AS, HS), pp. 571–573.
ICPRICPR-1998-SoilleT #image #using
Image structure orientation using mathematical morphology (PS, HT), pp. 1467–1469.
ICPRICPR-1998-StoddartB #multi #re-engineering #using
Surface reconstruction and compression using multiresolution arbitrary topology G1 continuous splines (AJS, MSB), pp. 788–791.
ICPRICPR-1998-SukanyaTS #classification #image #multi #using
Image classification using the surface-shape operator and multiscale features (PS, RT, MS), pp. 334–337.
ICPRICPR-1998-SuzukiKM #fuzzy #memory management #set #using
Associative memory system using fuzzy sets (YS, NK, JM), pp. 331–333.
ICPRICPR-1998-SvalbeE #image #locality #metric #rank #using
Localisation of image features using measures of rank distribution (IDS, CJE), pp. 189–191.
ICPRICPR-1998-TakacsW #image #library #metric #performance #using
Fast searching of digital face libraries using binary image metrics (BT, HW), pp. 1235–1237.
ICPRICPR-1998-TerrillonDA #detection #image #invariant
Detection of human faces in complex scene images by use of a skin color model and of invariant Fourier-Mellin moments (JCT, MD, SA), pp. 1350–1355.
ICPRICPR-1998-TissainayagamS #algorithm #using #visual notation
Visual tracking and motion determination using the IMM algorithm (PT, DS), pp. 289–291.
ICPRICPR-1998-TominagaKMK #detection #performance #using
Realization of an efficient line detection by askant glance camera vision system using extended Hough transform (MT, KK, KM, HK), pp. 225–228.
ICPRICPR-1998-ToyamaSM #algorithm #estimation #modelling #search-based #using
Model-based pose estimation using genetic algorithm (FT, KS, JM), pp. 198–201.
ICPRICPR-1998-VelA #image #recognition #using
View-based object recognition using image lines (OYdV, SA), pp. 805–807.
ICPRICPR-1998-WangLL #classification #composition #markov #modelling #random #using
Texture classification using wavelet decomposition with Markov random field models (LW, JL, SZL), pp. 1613–1615.
ICPRICPR-1998-WatanabeMM #detection #image #using
Detecting changes of buildings from aerial images using shadow and shading model (SW, KM, NM), pp. 1408–1412.
ICPRICPR-1998-WatanabeY #gesture #image #multi #realtime #recognition #sequence #using
Real time recognition of gesture and gesture degree information using multi input image sequences (TW, MY), pp. 1855–1858.
ICPRICPR-1998-WorthingtonHH #recognition #using
Appearance-based object recognition using shape-from-shading (PLW, BH, ERH), pp. 412–416.
ICPRICPR-1998-WouwerSD #invariant #using
Rotation-invariant texture characterization using isotropic wavelet frames (GVdW, PS, DVD), pp. 814–816.
ICPRICPR-1998-XuS #detection #realtime #using
Rits Eye: a software-based system for real-time face detection and tracking using pan-tilt-zoom controllable camera (GX, TS), pp. 1194–1197.
ICPRICPR-1998-Yamada #pattern matching #query #retrieval #using
Handwritten text retrieval using two-stage pattern matching with handwritten query (KY), pp. 621–625.
ICPRICPR-1998-YamaguchiKI #graph #parametricity #relational #using
Stereo matching for stone statues using SRI parameters and relational graph (AY, KK, SI), pp. 785–787.
ICPRICPR-1998-YonemotoTT #3d #multi #sequence #using
Tracking of 3D multi-part objects using multiple viewpoint time-varying sequences (SY, NT, RiT), pp. 490–494.
ICPRICPR-1998-YoungKM #evolution #modelling #using
Hypothesis selection for scene interpretation using grammatical models of scene evolution (RCDY, JK, JM), pp. 1718–1720.
ICPRICPR-1998-ZhaHH #3d #algorithm #modelling #recursion #using
A recursive fitting-and-splitting algorithm for 3-D object modeling using superquadrics (HZ, TH, TH), pp. 658–662.
KDDKDD-1998-Bhattacharyya #algorithm #modelling #search-based #using
Direct Marketing Response Models Using Genetic Algorithms (SB), pp. 144–148.
KDDKDD-1998-CohenH #classification #using
Joins that Generalize: Text Classification Using WHIRL (WWC, HH), pp. 169–173.
KDDKDD-1998-NakhaeizadehTL #classification
Evaluating Usefulness for Dynamic Classification (GN, CT, CL), pp. 87–93.
KDDKDD-1998-ThomasS #mining #query #sql #using
Mining Generalized Association Rules and Sequential Patterns Using SQL Queries (ST, SS), pp. 344–348.
KRKR-1998-Horrocks #logic #question #using
Using an Expressive Description Logic: FaCT or Fiction? (IH), pp. 636–649.
KRKR-1998-Kamps #automation #formal method #reasoning #tool support #using
Formal Theory Building Using Automated Reasoning Tools (JK), pp. 478–487.
KRKR-1998-Kusters #automaton #finite #semantics #using
Characterizing the Semantics of Terminological Cycles in ALN Using Finite Automata (RK), pp. 499–511.
SIGIRSIGIR-1998-CarbonellG #documentation #order #ranking #summary
The Use of MMR, Diversity-Based Reranking for Reordering Documents and Producing Summaries (JGC, JG), pp. 335–336.
SIGIRSIGIR-1998-HascoetS #library #user interface #using
Using Maps as a User Interface to a Digital Library (MH, XS), pp. 339–340.
SIGIRSIGIR-1998-JonesSKS #retrieval #using
Experiments in Japanese Text Retrieval and Routing Using the NEAT System (GJFJ, TS, MK, KS), pp. 197–205.
SIGIRSIGIR-1998-LaiT #image #retrieval #using
Using Global Colour Features for General Photographic Image Indexing and Retrieval (TSL, JT), pp. 349–350.
SIGIRSIGIR-1998-LamH #automation #categorisation #set #using
Using a Generalized Instance Set for Automatic Text Categorization (WL, CYH), pp. 81–89.
SIGIRSIGIR-1998-Larkey #automation #categorisation #using
Automatic Essay Grading Using Text Categorization Techniques (LSL), pp. 90–95.
SIGIRSIGIR-1998-MechkourHM #clustering #using #web
The WebCluster Project: Using Clustering for Mediating Access to the World Wide Web (MM, DJH, GM), pp. 357–358.
SIGIRSIGIR-1998-NgZ #fault #retrieval #speech #using
Speech Retrieval Using Phonemes with Error Correction (CN, JZ), pp. 365–366.
SIGIRSIGIR-1998-Picard #documentation #modelling #probability #using
Modeling and Combining Evidence Provided by Document Relationships Using Probabilistic Argumentation Systems (JP), pp. 182–189.
SIGIRSIGIR-1998-SuzukiFS #keyword #using
Keyword Extraction of Radio News Using Term Weighting with an Encyclopedia and Newspaper Articles (YS, FF, YS), pp. 373–374.
SIGIRSIGIR-1998-YamanaTKKHNAKSM #distributed #using
Experiments of Collecting WWW Information Using Distributed WWW Robots (HY, KT, HK, SK, MH, HN, IA, HK, YS, YM), pp. 379–380.
UMLUML-1998-Ou #constraints #database #design #diagrams #object-oriented #on the #specification #uml #using
On Using UML Class Diagrams for Object-Oriented Database Design. Specification of Integrity Constraints (YO), pp. 173–188.
UMLUML-1998-OvergaardP #approach #case study #formal method
A Formal Approach to Use Cases and Their Relationships (, KP), pp. 406–418.
ECOOPECOOP-1998-CordsenS #case study #experience #memory management #paradigm #using
Experiences Developing a Virtual Shared Memory System Using High-Level Object Paradigms (JC, JN, WSP), pp. 285–306.
ECOOPECOOP-1998-KrishnamurthiFF #design #functional #object-oriented
Synthesizing Object-Oriented and Functional Design to Promote Re-Use (SK, MF, DPF), pp. 91–113.
OOPSLAOOPSLA-1998-CockburnF #case study #exclamation
Question time! about Use Cases (AC, MF), pp. 226–229.
TOOLSTOOLS-ASIA-1998-CoddingtonHKMWWIGJT #corba #implementation #java #library #using
Implementation of a Geospatial Imagery Digital Library Using Java and CORBA (PDC, KAH, KEK, JAM, AJS, DLW, PJW, CGI, MWG, RJ, KT), pp. 280–289.
TOOLSTOOLS-ASIA-1998-PeriorellisBS #dependence #enterprise #modelling #network #object-oriented #paradigm #using
Modeling Enterprise Dependency Networks Using an Object Oriented Paradigm (PP, AB, PS), p. 148–?.
TOOLSTOOLS-PACIFIC-1998-SonYK #component #development #java #using
A Component-Based Client/Server Application Development Environment using Java (SS, IY, CK), pp. 168–179.
TOOLSTOOLS-USA-1998-McKim #design #education #multi #object-oriented #programming #using
Using a Multi-Term Project to Teach Object Oriented Programming and Design (JCM), p. 468–?.
TOOLSTOOLS-USA-1998-Watkins #contract #interface #programming #using
Using Interface Definition Languages to Support Path Expressions and Programming by Contract (DW), p. 308–?.
TOOLSTOOLS-USA-1998-WydaegheVMDAJ #case study #design pattern #experience #using
Building an OMT-Editor Using Design Patterns: An Experience Report (BW, KV, BM, BVD, EA, VJ), pp. 20–32.
PPDPALP-PLILP-1998-ClearyL #using
Constructive Negation Using Typed Existence Properties (JGC, LL), pp. 411–426.
PPDPALP-PLILP-1998-ConselM #architecture #development #using
Architecture Software Using: A Methodology for Language Development (CC, RM), pp. 170–194.
PPDPALP-PLILP-1998-HatcliffDL #analysis #staging #using
Staging Static Analyses Using Abstraction-Based Program Specialization (JH, MBD, SL), pp. 134–151.
LOPSTRLOPSTR-1998-BaalenR #deduction #synthesis #using
Using Decision Procedures to Accelerate Domain-Specific Deductive Synthesis Systems (JVB, SR), pp. 61–70.
LOPSTRLOPSTR-1998-BrogiCT #source code
The Use of Renaming in Composing General Programs (AB, SC, FT), pp. 124–142.
LOPSTRLOPSTR-1998-Rosenblueth #source code #using
An Exhaustive-Search Method Using Layered Streams Obtained Through a Meta-Interpreter for Chain Programs (DAR), pp. 322–324.
LOPSTRLOPSTR-1998-SmausHK #fault #logic programming #multi #source code #using
Preventing Instantiation Errors and Loops for Logic Programs with Multiple Modes Using block Declarations (JGS, PMH, AK), pp. 289–307.
POPLPOPL-1998-KnobeS #array #parallel
Array SSA Form and Its Use in Parallelization (KK, VS), pp. 107–120.
REICRE-1998-HammerH #automation #case study #experience #how #requirements #tool support
Automated Requirements Management — Beware HOW You Use Tools: An Experience Report (TH, LH), pp. 34–40.
REICRE-1998-KaindlKK #case study #functional #requirements #using
A Case Study of Decomposing Functional Requirements Using Scenarios (HK, SK, RK), pp. 156–163.
REICRE-1998-MaidenMMR #generative #named
CREWS-SAVRE: Systematic Scenario Generation and Use (NAMM, SM, KM, MR), pp. 148–155.
REICRE-1998-MillardLT #elicitation #game studies #requirements #using
Child’s Play: Using Techniques Developed to Elicit Requirements from Children with Adults (NM, PL, KT), pp. 66–73.
REICRE-1998-SchneiderECH #fault tolerance #model checking #requirements #using #validation
Validating Requirements for Fault Tolerant Systems using Model Checking (FS, SME, JRC, GJH), pp. 4–13.
REICRE-1998-Smith #framework #quality #requirements #using
Using a Quality Model Framework to Strengthen the Requirements (RCS), p. 118–?.
REFSQREFSQ-1998-Paech #case study
The Four Levels of Use Case Description (BP), pp. 207–218.
SACSAC-1998-AhmedDR #fuzzy #graph #memory management #performance #reuse #using
Fast recall of reusable fuzzy plans using acyclic directed graph memory (MA, ED, DCR), pp. 272–276.
SACSAC-1998-ArbabM #constraints #coordination #theorem proving #using
Using coordination for cooperative constraint solving (FA, EM), pp. 139–148.
SACSAC-1998-KangH #algorithm #graph transformation #problem #search-based #using
Solving the rural postman problem using a genetic algorithm with a graph transformation (MJK, CGH), pp. 356–360.
SACSAC-1998-KarakasK #adaptation #fuzzy #logic #using
Adaptive control of Bolu highway tunnel ventilation system using fuzzy logic (EK, HK), pp. 282–286.
SACSAC-1998-Konstam #algorithm #classification #programming #search-based #using
Group classification using a mix of genetic programming and genetic algorithms (AHK), pp. 308–312.
SACSAC-1998-LazanoM #query #using
Querying virtual videos using path and temporal expressions (RL, HM), pp. 248–252.
SACSAC-1998-McGuireS #algorithm #linear #search-based #using
Using a genetic algorithm to find good linear error-correcting codes (KMM, RES), pp. 332–337.
SACSAC-1998-PapadopoulosA #coordination #information management #modelling #process #using
Modelling activities in information systems using the coordination language MANIFOLD (GAP, FA), pp. 185–193.
SACSAC-1998-RobbinsR #animation #information management #using #visualisation
Web-based dynamic information visualization using exact-time animation (KAR, SR), pp. 744–751.
SACSAC-1998-WaldenBH #approximate #clustering #fuzzy #multi #using
Evaluating multi-valued inverse functions using clustering and fuzzy approximations (MAW, MB, AH), pp. 74–79.
FSEFSE-1998-GuptaMS #automation #generative #testing #using
Automated Test Data Generation Using an Iterative Relaxation Method (NG, APM, MLS), pp. 231–244.
FSEFSE-1998-KontioGL #case study #concept #experience #process #risk management #using
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
FSEFSE-1998-SneltingT #concept analysis #re-engineering #using
Reengineering Class Hierarchies Using Concept Analysis (GS, FT), pp. 99–110.
ICSEICSE-1998-AlmeidaLM #modelling
An Investigation on the Use of Machine Learned Models for Estimating Correction Costs (MAdA, HL, WLM), pp. 473–476.
ICSEICSE-1998-AntonP #evolution #requirements
The Use of Goals to Surface Requirements for Evolving Systems (AIA, CP), pp. 157–166.
ICSEICSE-1998-BriandELF #benchmark #development #metric #performance #simulation #using
Using Simulation to Build Inspection Efficiency Benchmarks for Development Projects (LCB, KEE, OL, TF), pp. 340–349.
ASPLOSASPLOS-1998-KrintzCLZ #execution #mobile #source code #strict #using
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs (CK, BC, HBL, BGZ), pp. 159–169.
ASPLOSASPLOS-1998-SchnarrL #performance #simulation #using
Fast Out-Of-Order Processor Simulation Using Memoization (ES, JRL), pp. 283–294.
HPCAHPCA-1998-BasuT #memory management #multi
Enhancing Memory Use in Simple Coma: Multiplexed Simple Coma (SB, JT), pp. 152–161.
HPCAHPCA-1998-SpeightB #communication #multi #thread #using
Using Multicast and Multithreading to Reduce Communication in Software DSM Systems (ES, JKB), pp. 312–322.
HPCAHPCA-1998-SteffanM #automation #concurrent #parallel #thread #using
The Potential for Using Thread-Level Data Speculation to Facilitate Automatic Parallelization (JGS, TCM), pp. 2–13.
HPDCHPDC-1998-BeckmanFHM #parallel #performance #using
Efficient Coupling of Parallel Applications Using PAWS (PHB, PKF, WFH, SMM), pp. 215–222.
HPDCHPDC-1998-ChenWCK #algorithm #automation #optimisation #parallel #performance #search-based #using
Automatic Parallel I/O Performance Optimization Using Genetic Algorithms (YC, MW, YC, SWK), pp. 155–162.
HPDCHPDC-1998-Nguyen-TuongCG #using
Extending Metasystem Functionality Using Reflection (ANT, SJC, ASG), pp. 346–347.
HPDCHPDC-1998-ZhangSL #message passing #source code #using
Dynamically Instrumenting Message-Passing Programs Using Virtual Clocks (KZ, CS, KCL), pp. 340–341.
ISMMISMM-1998-ChilimbiL #garbage collection #using
Using Generational Garbage Collection To Implement Cache-Conscious Data Placement (TMC, JRL), pp. 37–48.
LCTESLCTES-1998-LundqvistS #analysis #simulation #using
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
LCTESLCTES-1998-Selic #modelling #realtime #uml #using
Using UML for Modeling Complex Real-Time Systems (BS), pp. 250–260.
LCTESLCTES-1998-YurkoskiRE #java #using
Using InfernoTM to Execute JavaTM on Small Devices (CFY, LRR, BKE), pp. 108–118.
CADECADE-1998-FeveW #algebra #geometry #proving #theorem #using
Proving Geometric Theorems Using Clifford Algebra and Rewrite Rules (SF, DW), pp. 17–31.
CADECADE-1998-Letz #using
Using Matings for Pruning Connection Tableaux (RL), pp. 381–396.
CAVCAV-1998-BelluominiM #using #verification
Verification of Timed Systems Using POSETs (WB, CJM), pp. 403–415.
CAVCAV-1998-ColonU #abstraction #finite #generative #using
Generating Finite-State Abstractions of Reactive Systems Using Decision Procedures (MC, TEU), pp. 293–304.
CAVCAV-1998-CourturierM #empirical #formal method #using
An Experiment in Parallelizing an Application Using Formal Methods (RC, DM), pp. 345–356.
CAVCAV-1998-SkakkebaekJD #execution #incremental #using #verification
Formal Verification of Out-of-Order Execution Using Incremental Flushing (JUS, RBJ, DLD), pp. 98–109.
CAVCAV-1998-SternD #in memory #memory management #using #verification
Using Magnatic Disk Instead of Main Memory in the Murphi Verifier (US, DLD), pp. 172–183.
CAVCAV-1998-Wallner #ltl #model checking #using
Model Checking LTL Using Net Unforldings (FW), pp. 207–218.
CAVCAV-1998-XuCSCM #first-order #graph #logic #model checking #multi #using
Model Checking for a First-Order Temporal Logic Using Multiway Decision Graphs (YX, EC, XS, FC, OAM), pp. 219–231.
ISSTAISSTA-1998-GodefroidHJ #analysis #model checking #monitoring #using
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
ISSTAISSTA-1998-GotliebBR #automation #constraints #generative #testing #theorem proving #using
Automatic Test Data Generation Using Constraint Solving Techniques (AG, BB, MR), pp. 53–62.
ISSTAISSTA-1998-TraceyCM #automation #using
Automated Program Flaw Finding Using Simulated Annealing (NT, JAC, KM), pp. 73–81.
ICTSSIWTCS-1998-FeijsMMW #consistency #multi #testing #using
Conformance Testing of a Multimedia System Using PHACT (LMGF, FACM, JRM, JvW), pp. 193–210.
ICTSSIWTCS-1998-PetrenkoUC #concurrent #detection #fault #using
Using Partial-Orders for Detecting Faults in Concurrent Systems (AP, AU, VC), pp. 175–190.
RTARTA-1998-ArtsG #composition #dependence #termination #using
Modularity of Termination Using Dependency pairs (TA, JG), pp. 226–240.
ASEASE-1997-DevanbuS #automation #hardware #research #using #verification
Research Directions for Automated Software Verification: Using Trusted Hardware (PTD, SGS), pp. 274–279.
ASEASE-1997-FenselS #architecture #knowledge-based #using #verification
Using KIV to Specify and Verify Architectures of Knowledge-Based Systems (DF, AS), p. 71–?.
ASEASE-1997-Hall #automation #library #reasoning #using #validation
Reactive System Validation using Automated Reasoning over a Fragment Library (RJH), pp. 299–300.
ASEASE-1997-Pecheur #distributed #specification #using #verification
Specification and Verification of the Co4 Distributed Knowledge System using LOTOS (CP), pp. 63–70.
ASEASE-1997-Yamaguchi #modelling #ontology #process #using
Modeling Software Processes by using Process and Object Ontologies (TY), pp. 319–320.
DACDAC-1997-AmonBHL #diagrams #using #verification
Symbolic Timing Verification of Timing Diagrams using Presburger Formulas (TA, GB, TH, JL), pp. 226–231.
DACDAC-1997-Gebotys #energy #memory management #network #using
Low Energy Memory and Register Allocation Using Network Flow (CHG), pp. 435–440.
DACDAC-1997-GrundmannDAR #design #performance #using
Designing High Performance CMOS Microprocessors Using Full Custom Techniques (WJG, DD, RLA, NLR), pp. 722–727.
DACDAC-1997-GuptaMA #formal method #simulation #towards #using #validation
Toward Formalizing a Validation Methodology Using Simulation Coverage (AG, SM, PA), pp. 740–745.
DACDAC-1997-HenkelE #hardware #using
A Hardware/Software Partitioner Using a Dynamically Determined Granularity (JH, RE), pp. 691–696.
DACDAC-1997-HongBBM #using
Safe BDD Minimization Using Don’t Cares (YH, PAB, JRB, KLM), pp. 208–213.
DACDAC-1997-KimC #synthesis #using
Power-conscious High Level Synthesis Using Loop Folding (DK, KC), pp. 441–445.
DACDAC-1997-KuehlmannK #equivalence #using
Equivalence Checking Using Cuts and Heaps (AK, FK), pp. 263–268.
DACDAC-1997-LiaoD #bound #problem #using
Solving Covering Problems Using LPR-Based Lower Bounds (SYL, SD), pp. 117–120.
DACDAC-1997-LiG #exception #modelling #optimisation
Limited Exception Modeling and Its Use in Presynthesis Optimizations (JL, RKG), pp. 341–346.
DACDAC-1997-PandeyRBA #evaluation #using #verification
Formal Verification of Content Addressable Memories Using Symbolic Trajectory Evaluation (MP, RR, REB, MSA), pp. 167–172.
DACDAC-1997-PomeranzR #approach #fault #multi #simulation #using
Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
DACDAC-1997-SentovichTB #optimisation #performance #set #using
Efficient Latch Optimization Using Exclusive Sets (ES, HT, GB), pp. 8–11.
DACDAC-1997-XanthopoulosYC #architecture #case study #estimation #using
Architectural Exploration Using Verilog-Based Power Estimation: A Case Study of the IDCT (TX, YY, AC), pp. 415–420.
DATEEDTC-1997-ArabiK #performance #testing #using
Efficient and accurate testing of analog-to-digital converters using oscillation-test method (KA, BK), pp. 348–352.
DATEEDTC-1997-BeckmannH #constraints #in memory #logic programming #memory management #synthesis #using
Using constraint logic programming in memory synthesis for general purpose computers (RB, JH), p. 619.
DATEEDTC-1997-GirodiasC #constraints #correlation #interface #logic programming #using #verification
Interface timing verification with delay correlation using constraint logic programming (PG, EC), pp. 12–19.
DATEEDTC-1997-HsiaoRP #generative #testing #traversal #using
Sequential circuit test generation using dynamic state traversal (MSH, EMR, JHP), pp. 22–28.
DATEEDTC-1997-KropfR #model checking #using
Using MTBDDs for discrete timed symbolic model checking (TK, JR), pp. 182–187.
DATEEDTC-1997-LiuS #graph #heuristic #multi #performance #using
Multi-layer chip-level global routing using an efficient graph-based Steiner tree heuristic (LCEL, CS), pp. 311–318.
DATEEDTC-1997-MignotteP #scheduling #using
Scheduling using mixed arithmetic: an ILP formulation (AM, OP), p. 621.
DATEEDTC-1997-NouraniP #analysis #behaviour #using
Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
DATEEDTC-1997-PomeranzR97a #finite #on the #state machine #testing
On the use of reset to increase the testability of interconnected finite-state machines (IP, SMR), pp. 554–559.
DATEEDTC-1997-RomanowiczLLRABMP #hardware #modelling #simulation #transducer #using
Modeling and simulation of electromechanical transducers in microsystems using an analog hardware description language (BR, ML, PL, PR, HPA, AB, VM, FP), pp. 119–123.
DATEEDTC-1997-SurtiCT #automaton #design #encoding #power management #using
Low power FSM design using Huffman-style encoding (PS, LFC, AT), pp. 521–525.
DATEEDTC-1997-TsengS #multi #standard #using
A gridless multi-layer router for standard cell circuits using CTM cells (HPT, CS), pp. 319–326.
DATEEDTC-1997-UrsuGZ #automaton #design #logic #specification #using #verification
Design and verification of the sequential systems automata using temporal logic specifications (AU, GG, SZ), p. 623.
DATEEDTC-1997-WalrathVB #analysis #partial evaluation #performance #using #verification
Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
DATEEDTC-1997-WunscheCSW #design #using
Microsystem design using simulator coupling (SW, CC, PS, FW), pp. 113–118.
HTHT-1997-BalasubramanianBP #documentation #hypermedia #scalability #using #web
A Large-Scale Hypermedia Application using Document Management and Web Technologies (VB, AB, DP), pp. 134–145.
HTHT-1997-Chuat #hypermedia #using #what
Using Hypertext for Textual Genetics, or, What is Suitable in a Hypertext System for an Information Gardening Application (CC), pp. 230–231.
ICDARICDAR-1997-AminM #network #recognition #using
Recognition of Printed Arabic Text Using Neural Networks (AA, WM), pp. 612–615.
ICDARICDAR-1997-AnisimovichRST #classification #recognition #using
Using Combination of Structural, Feature and Raster Classifiers for Recognition of Handprinted Characters (KA, VR, AS, VT), pp. 881–885.
ICDARICDAR-1997-BruggerZI #documentation #modelling #n-gram #recognition #using
Modeling Documents for Structure Recognition Using Generalized N-Grams (RB, AWZ, RI), pp. 56–60.
ICDARICDAR-1997-CoteCLS #automation #using
Automatic Reading of Cursive Scripts Using Human Knowledge (MC, MC, EL, CYS), pp. 107–111.
ICDARICDAR-1997-CullenHH #analysis #database #documentation #image #retrieval #using
Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
ICDARICDAR-1997-DingLS #classification #using
Classification of Oriental and European Scripts by Using Characteristic Features (JD, LL, CYS), pp. 1023–1027.
ICDARICDAR-1997-DuDLA #documentation #evaluation #lazy evaluation #recognition #semantics #using
Generalized Contextual Recognition of Hand-Printed Documents Using Semantic Trees with Lazy Evaluation (LD, ACD, SML, BAB), pp. 238–242.
ICDARICDAR-1997-Favata #approximate #recognition #string #using #word
General word recognition using approximate segment-string matching (JTF), pp. 92–96.
ICDARICDAR-1997-HennigSW #fuzzy #online #using
Recognizing Letters in on-line Handwriting using Hierarchical Fuzzy Inference (AH, NS, RJW), pp. 936–940.
ICDARICDAR-1997-HiranoOY #recognition #using
Structural Character Recognition Using Simulated Annealing (TH, YO, FY), pp. 507–510.
ICDARICDAR-1997-HoriuchiHYY #2d #normalisation #recognition #using
Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
ICDARICDAR-1997-IshideraNY #recognition #using #word
Unconstrained Japanese Address Recognition Using a Combination of Spatial Information and Word Knowledge (EI, DN, KY), p. 1016–?.
ICDARICDAR-1997-JainY #documentation #segmentation #using
Page Segmentation Using Document Model (AKJ, BY), pp. 34–38.
ICDARICDAR-1997-KashiHNT #markov #online #using #verification
On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
ICDARICDAR-1997-KawataniS #classification #component #design #difference #using
Complementary Classifier Design Using Difference Principal Components (TK, HS), pp. 875–880.
ICDARICDAR-1997-KeeniSN #distributed #network #on the #representation #using
On Distributed Representation of Output Layer for Recognizing Japanese Kana characters Using Neural Networks (KK, HS, KN), pp. 600–603.
ICDARICDAR-1997-KosmalaRR #markov #modelling #online #recognition #using
Improved On-Line Handwriting Recognition Using Context Dependent Hidden Markov Models (AK, JR, GR), pp. 641–644.
ICDARICDAR-1997-LiaoL #case study #recognition
A study of moment functions and its use in Chinese character recognition (SXL, QL), pp. 572–575.
ICDARICDAR-1997-LinDW #multi #recognition #using
Handwritten Numeral Recognition Using MFNN Based Multiexpert Combination Strategy (XL, XD, YW), pp. 471–474.
ICDARICDAR-1997-LinNN #analysis #documentation #image #logic #using
Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
ICDARICDAR-1997-MadhvanathK #scalability #using #word
Pruning Large Lexicons Using Generalized Word Shape Descriptors (SM, VK), pp. 552–555.
ICDARICDAR-1997-NavoniCCGKR #memory management #recognition #using #word
Words Recognition using Associative Memory (LN, RC, MC, GG, AK, PLR), pp. 97–101.
ICDARICDAR-1997-NobileBSK #documentation #identification #online #using #word
Language identification of on-line documents using word shapes (NN, SB, CYS, SK), pp. 258–262.
ICDARICDAR-1997-Oguro #documentation #image #representation #using
Faxed Document Image Restoration Using Gray Level Representation (MO), pp. 679–683.
ICDARICDAR-1997-PavlidisSP #online #recognition #using
An On-Line Handwritten Note Recognition Method Using Shape Metamorphosis (IP, RS, NP), pp. 914–918.
ICDARICDAR-1997-RahmanF #case study #multi #recognition #using
Introducing New Multiple Expert Decision Combination Topologies: A Case Study using Recognition of Handwritten Characters (AFRR, MCF), p. 886–?.
ICDARICDAR-1997-RazaHSW #database #documentation #recognition #robust #using
Recognition of Facsimile Documents using a Database of Robust Features (GR, AH, NS, RJW), p. 444–?.
ICDARICDAR-1997-ShridharHK #recognition #using #word
Handwritten Word Recognition Using Lexicon Free and Lexicon Directed Word (MS, GFH, FK), pp. 861–865.
ICDARICDAR-1997-SmeatonS #information retrieval #using
Using Character Shape Coding for Information Retrieval (AFS, ALS), p. 974–?.
ICDARICDAR-1997-Soffer #categorisation #image #using
Image Categorization Using Texture Features (AS), pp. 233–237.
ICDARICDAR-1997-StuckelbergPH #architecture #recognition #using
An Architecture for Musical Score Recognition using High-Level Domain Knowledge (MVS, CP, MH), pp. 813–818.
ICDARICDAR-1997-SudaBKM #approach #using #word
Logo and Word Matching Using a General Approach to Signal Registration (PS, CB, BK, GM), p. 61–?.
ICDARICDAR-1997-SunS #documentation #image #using
Skew and Slant Correction for Document Images Using Gradient Direction (CS, DS), pp. 142–146.
ICDARICDAR-1997-TonouchiK #algorithm #online #recognition #using
An on-line Japanese character recognition method using length-based stroke correspondence algorithm (YT, AK), pp. 633–636.
ICDARICDAR-1997-WaizumiKSN #classification #learning #using
High speed rough classification for handwritten characters using hierarchical learning vector quantization (YW, NK, KS, YN), pp. 23–27.
ICDARICDAR-1997-WakaharaO #adaptation #normalisation #using
Adaptive Normalization of Handwritten Characters Using Global/Local Affine Transformation (TW, KO), p. 28–?.
PODSPODS-1997-BeeriLR #logic #query #using
Rewriting Queries Using Views in Description Logics (CB, AYL, MCR), pp. 99–108.
PODSPODS-1997-DuschkaG #query #recursion #using
Answering Recursive Queries Using Views (OMD, MRG), pp. 109–116.
PODSPODS-1997-HoBA #query #using
Partial-Sum Queries in Data Cubes Using Covering Codes (CTH, JB, RA), pp. 228–237.
VLDBVLDB-1997-AshwinRSSS #database #garbage collection #object-oriented #transaction #using
Garbage Collection in Object Oriented Databases Using Transactional Cyclic Reference Counting (SA, PR, SS, AS, SS), pp. 366–375.
VLDBVLDB-1997-ChakrabartiDAR #database #navigation #taxonomy #using
Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
VLDBVLDB-1997-ChangG #effectiveness #memory management
Effective Memory Use in a Media Server (EYC, HGM), pp. 496–505.
VLDBVLDB-1997-FlorescuKLP #integration #probability #using
Using Probabilistic Information in Data Integration (DF, DK, AYL), pp. 216–225.
VLDBVLDB-1997-HuangJR #optimisation #traversal #using
Spatial Joins Using R-trees: Breadth-First Traversal with Global Optimizations (YWH, NJ, EAR), pp. 396–405.
VLDBVLDB-1997-LlirbatST #transaction #using
Using Versions in Update Transactions: Application to Integrity Checking (FL, ES, DT), pp. 96–105.
VLDBVLDB-1997-VassalosP #query #using
Describing and Using Query Capabilities of Heterogeneous Sources (VV, YP), pp. 256–265.
VLDBVLDB-1997-WhiteheadSM #information retrieval #using
GTE SuperPages: Using IR Techniques for Searching Complex Objects (SDW, HS, MM), pp. 553–557.
CSEETCSEET-1997-Pierce #education #re-engineering #using
Teaching software engineering principles using maintenance-based projects (KRP), pp. 53–60.
ITiCSEITiCSE-1997-DankelH #distance #learning
The use of the WWW to support distance learning through NTU (DDDI, JH), pp. 8–10.
ITiCSEITiCSE-1997-DixonMK #education #network #simulation #using
Using a network simulation package to teach the client-server model (MWD, TJM, JMK), pp. 71–73.
ITiCSEITiCSE-1997-Goldberg #student
WebCT and first year: student reaction to and use of a Web-based resource in first year computer science (MWG), pp. 127–129.
ITiCSEITiCSE-1997-GrangerL #education #using
Using IT to integrate societal and ethical issues in the CS/IS curriculum (panel) (MJG, JCL), p. 144.
ITiCSEITiCSE-1997-Naps97a #interactive #using #visualisation
Using the WWW as the delivery mechanism for interactive, visualization-based instructional modules (panel) (TLN), p. 143.
ITiCSEITiCSE-1997-PalmeM #education
Use of computer conferencing to teach a course on humans and computers (JP, SM), pp. 88–90.
ITiCSEITiCSE-1997-RoblesFPA #communication #distance #learning #multi #using
Using multimedia communication technologies in distance learning (TR, DF, EP, SA), pp. 6–7.
ITiCSEITiCSE-1997-SchallerBBNRW #education #java #using
Using Java in computer science education (panel) (NCS, MB, JB, PN, EPR, PW), pp. 140–142.
ITiCSEITiCSE-1997-Taylor #communication #online #social #using
Using online seminars to demonstrate the social psychological impacts of computer-mediated communication systems (JT), pp. 80–84.
ITiCSEITiCSE-WGR-1997-BogoiavlenskiPS #education
Use of computing curricula 1991 for transition from “Mathematics” to “Applied Mathematics and CS” baccalaureate programme (poster) (IAB, AAP, GSS, AVV), p. 144.
ITiCSEITiCSE-WGR-1997-DagdilelisS #programming #using
Using Emil Post’s machine for an introduction to formal programming (poster) (VD, MS), p. 147.
ITiCSEITiCSE-WGR-1997-DomingoGLRM #approach #generative #programming #using
SEDA, an advanced software tool in its generation: developing a Windows tutor using SEDA versus a classical programming approach (poster) (PD, ÁGC, ML, BR, VMO), p. 148.
ITiCSEITiCSE-WGR-1997-GrangerLABGJMY #education #information management #social #using
Using information technology to integrate social and ethical issues into the computer science and information systems curriculum (report of the ITiCSE 1997 working group on social and ethical issue in computing curricula) (MJG, JCL, ESA, CB, DG, DDJ, CDM, FHY), pp. 38–50.
ITiCSEITiCSE-WGR-1997-Lawhead97b #algorithm #java #using
Algorithm demonstrations using Java (demonstration) (PBL), p. 151.
ITiCSEITiCSE-WGR-1997-NapsBJMPPT #interactive #using #visualisation
Using the WWW as the delivery mechanism for interactive, visualization-based instructional modules (report of the ITiCSE 1997 working group on visualization) (TLN, JB, RJP, MFM, MPM, VKP, JT), pp. 13–26.
ITiCSEITiCSE-WGR-1997-SchallerBBNRW97a #education #java #using
Using Java in computer science education (panel) (NCS, MB, JB, PN, EPR, PW), pp. 140–143.
TACASTACAS-1997-EngelsFM #generative #model checking #network #testing #using
Test Generation for Intelligent Networks Using Model Checking (AE, LMGF, SM), pp. 384–398.
TACASTACAS-1997-ParashkevovY #analysis #performance #pseudo #reachability
Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
CSMRCSMR-1997-Aebi #migration #multi #process #re-engineering
A process model for re-engineering, migration and multi-use of business data (DA), pp. 106–113.
CSMRCSMR-1997-Michael #constraints #evolution #using
Using evolution constraints to assess the failure-proneness of evolving software (CCM), pp. 48–53.
CSMRCSMR-1997-MullerG #case study #experience #standard #tool support #using
Planning Year 2000 transformations using standard tools: an experience report (BM, RG), pp. 94–100.
CSMRCSMR-1997-PidaparthiC #case study #design #migration #object-oriented #using
Case Study in Migration to Object-Oriented System Structure Using Design Transformation Methods (SP, GC), pp. 128–135.
ICSMEICSM-1997-Gupta #case study #comprehension #experience #using
Program Understanding Using Program Slivers — An Experience Report (AG), pp. 66–71.
WCREWCRE-1997-JerdingR #architecture #locality #using #visualisation
Using Visualization for Architectural Localization and Extraction (DFJ, SR), pp. 56–65.
WCREWCRE-1997-Kontogiannis #detection #evaluation #metric #programming #using
Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics (KK), p. 44–?.
WCREWCRE-1997-Wiggerts #algorithm #clustering #legacy #using
Using Clustering Algorithms in Legacy Systems Remodularization (TAW), pp. 33–43.
WPCWPC-1997-MooreR #information management #interactive #representation #using
Using Knowledge Representation to Understand Interactive Systems (MMM, SR), pp. 60–67.
WPCWPC-1997-TilleyS #framework #on the #re-engineering #using #web
On Using the Web as Infrastructure for Reengineering (SRT, DBS), pp. 170–173.
ICSMEICSM-2000-Lynd #2d #maintenance #using
Living with the 2-digit Year Year 2000 Maintenance Using a Procedural Solution (ECL), p. 206–?.
ICSMEICSM-2000-MullerWS #framework #standard #using
Wrapping coarse-grained objects using standard infrastructure technology (HAM, KW, MADS), p. 301.
ICSMEICSM-2000-Schneidewind #maintenance #metric #process #reliability #using
Measuring and evaluating maintenance process using reliability, risk, and test metrics (NFS), p. 232–?.
PEPMPEPM-1997-BeshersF #compilation #generative #partial evaluation #performance #using #visualisation
Generating Efficient Virtual Worlds for Visualization Using Partial Evaluation and Dynamic Compilation (CB, SF), pp. 107–115.
PLDIPLDI-1997-BodikG #slicing #using
Partial Dead Code Elimination using Slicing Transformations (RB, RG), pp. 159–170.
PLDIPLDI-1997-HashemiKC #performance #using
Efficient Procedure Mapping Using Cache Line Coloring (AHH, DRK, BC), pp. 171–182.
PLDIPLDI-1997-JensenJKS #automation #higher-order #logic #monad #pointer #source code #using #verification
Automatic Verification of Pointer Programs using Monadic Second-Order Logic (JLJ, MEJ, NK, MIS), pp. 226–236.
PLDIPLDI-1997-Webber #program analysis #using
Program Analysis Using Binary Relations (ABW), pp. 249–260.
SASSAS-1997-Braunburger #analysis #automation #order #polynomial #termination #using
Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
SASSAS-1997-FahndrichA #constraints #program analysis #set #using
Program Analysis Using Mixed Term and Set Constraints (MF, AA), pp. 114–126.
SASSAS-1997-HornofCN #effectiveness #source code
Effective Specialization of Realistic Programs via Use Sensitivity (LH, CC, JN), pp. 293–314.
STOCSTOC-1997-BuhlerSS #fourier #integer #performance #precise #using
Fast and Precise Computations of Discrete Fourier Transforms Using Cyclotomic Integers (JB, MAS, VS), pp. 40–47.
STOCSTOC-1997-FreundSSW #predict #using
Using and Combining Predictors That Specialize (YF, RES, YS, MKW), pp. 334–343.
STOCSTOC-1997-Karger #graph #random #using
Using Random Sampling to Find Maximum Flows in Uncapacitated Undirected Graphs (DRK), pp. 240–249.
DLTDLT-1997-WatanabeT #attribute grammar #evaluation #using
An Attribute Evaluation of One-Pass Attribute Grammars Using Value Estimate (YW, TT), pp. 155–165.
ICALPICALP-1997-DiekertMM #equation #normalisation #using
Solving Trace Equations Using Lexicographical Normal Forms (VD, YM, AM), pp. 336–346.
CIAAWIA-1997-BertaultK #automaton #using #visualisation
Visualization of Dynamic Automata Using Padnon (FB, GK), pp. 25–28.
CIAAWIA-1997-SalomaaWY #implementation #performance #regular expression #using
Efficient Implementation of Regular Languages Using R-AFA (KS, XW, SY), pp. 176–184.
FMFME-1997-DevauchelleLV #named #specification
PICGAL: Practical Use of Formal Specification to Develop a Complex Critical System (LD, PGL, HV), pp. 221–236.
FMFME-1997-Gregoire #protocol #proving #using
TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
FMFME-1997-Kellomaki #using #verification
Verification of Reactive Systems Using DisCo and PVS (PK), pp. 589–604.
FMFME-1997-Stringer-CalvertSW #case study #refinement #using
Using PVS to Prove a Z Refinement: A Case Study (DWJSC, SS, IW), pp. 573–588.
ICFPICFP-1997-RichardST #set #using
Intensional Sets Using Explicit Substitutions (GR, FS, ATA), p. 318.
IFLIFL-1997-KarlsenW #concurrent #haskell #repository #using
Using Concurrent Haskell to Develop Views over an Active Repository (EWK, SW), pp. 285–303.
IFLIFL-1997-Mogensen
Types for 0, 1 or Many Uses (TÆM), pp. 112–122.
IFLIFL-1997-Serrarens #multi #optimisation #using
Using Multicasting for Optimising Data-Parallelism (PRS), pp. 270–284.
CHICHI-1997-WordenWBH
Making Computers Easier for Older Adults to Use: Area Cursors and Sticky Icons (AW, NW, KB, SEH), pp. 266–271.
HCIHCI-CC-1997-Aoki #interface #using
An Ergonomical Study on Computer Interface Using Input Devices (MA), pp. 587–590.
HCIHCI-CC-1997-AraiYIHU #interface #using
An Input Interface System Using VEP for the Physically Challenged (YA, YY, KI, MH, YU), pp. 397–400.
HCIHCI-CC-1997-BadhamM #case study #implementation #tool support
Tools for Implementing Socio-Technical Systems: An Australian Case Study and the Use of Handbooks (RB, IM), pp. 245–248.
HCIHCI-CC-1997-CaldwellP #evaluation
Longitudinal Evaluation of Adoption and Use Patterns of Electronic Voice Messaging Systems (BSC, PVP), pp. 129–132.
HCIHCI-CC-1997-DobronetsSV #identification
Ergodynamic Method of Identification of the Cognitive Strategy Used by the Human-Operator (BSD, AAS, VFV), pp. 837–840.
HCIHCI-CC-1997-Fukuzumi #using
Discrimination of Living Body Fingers by Using EMG and Finger Pulse Volume (SF), pp. 575–578.
HCIHCI-CC-1997-ItohSY #using #visual notation
A Drawing Support System for the Visually Impaired Computer User Using a Virtual Sound Screen (KI, MS, YY), pp. 401–404.
HCIHCI-CC-1997-JasperEJNW #design #intranet #social #using
Using Cooperative Design to Introduce ORDBMS-Driven Intranet Applications to Collaborating Social Service Agencies (JEJ, RDE, TBJ, RN, SW), pp. 97–100.
HCIHCI-CC-1997-MajchrzakB #design #lessons learnt #using
Lessons Learned from Using a Computer-Based Tool to Support Sociotechnical Systems Design (AM, BB), pp. 221–224.
HCIHCI-CC-1997-PaneroLN #how #people
The Computer Use Scale: Four Dimensions of How People Use Computer (JCP, DML, HAN), pp. 821–824.
HCIHCI-CC-1997-PeperHS #assessment #how
How to Use Applied Psychophysiology/Biofeedback in the Prevention and Assessment of Upper Extremity Musculoskeletal Disorders (EP, RH, DMS), pp. 551–554.
HCIHCI-CC-1997-PerusichM #fuzzy #problem #using
Using Fuzzy Cognitive Maps to Define the Search Space in Problem Solving (KP, MDM), pp. 805–808.
HCIHCI-CC-1997-ShumayP #approach #using
Healthy Computing: A Comprehensive Group Training Approach Using Biofeedback (DMS, EP), pp. 555–558.
HCIHCI-CC-1997-Vanderheiden97a #architecture #interface
Use of a Common Table Architecture for Creating Hands Free, Eyes Free, Noisy Environment (Flex-Modal, Flex-Input) Interfaces (GCV), pp. 449–452.
HCIHCI-CC-1997-VendaL #assembly #evaluation #using
Ergonomic Evaluation of Manual Assembly Operations Using Direct and Indirect Observation Workstations in Sitting and Standing Positions (VFV, SSL), pp. 855–858.
HCIHCI-CC-1997-Weber #design #education #user interface
Design of Nonvisual User Interfaces for Use in Education (GW), pp. 413–416.
HCIHCI-CC-1997-WolberS #adaptation #aspect-oriented #design #using
Using Psychological Aspects for the Design of Adaptive IT-Tools for Cooperative Engineering (MW, PS), pp. 781–784.
HCIHCI-SEC-1997-ChurchillSBD #3d #documentation #using
Using VR-VIBE: Browsing and Searching for Documents in 3D-Space (EFC, DS, SB, PD), pp. 857–860.
HCIHCI-SEC-1997-FurutaNK
Vizualization of Knowledge Model Used for Plant Operation (KF, KN, SK), pp. 751–754.
HCIHCI-SEC-1997-GunjiKK #using
Quick Address Search System with Handwriting Using Character Transition Information (KG, SK, KK), pp. 423–426.
HCIHCI-SEC-1997-KoikeC #3d #using #version control #visualisation
Integrating Version Control and Module Management Using Three-Dimensional Visualization (HK, HCC), pp. 853–856.
HCIHCI-SEC-1997-KuzuokaN #using
Assisting Remote Instruction Using Copied Reality (HK, TN), pp. 957–960.
HCIHCI-SEC-1997-LawsonRGGM #challenge #human-computer #interface #using
The Human-Machine Interface Challenges of Using Virtual Environment (VE) Displays Aboard Centrifuge Devices (BDL, AHR, FEG, JDG, AMM), pp. 945–948.
HCIHCI-SEC-1997-Moustakis #human-computer #machine learning #people #question
Do People in HCI Use Machine Learning? (VM), pp. 95–98.
HCIHCI-SEC-1997-MuraiKI #3d #communication #multi #using #video
Display of Conversation Partners Using 3D-Facial Model in the Multiparty Video Communication System (TM, HK, SI), pp. 861–864.
HCIHCI-SEC-1997-NakajimaHNT #interface #realtime #using
A System for Real-time Groupware Using a Pen Interface for Creative Thought Support (KN, EH, MN, NT), pp. 443–446.
HCIHCI-SEC-1997-Neal #distance #learning #multi #using
Using Multiple Technologies for Distance Learning (LN), pp. 111–114.
HCIHCI-SEC-1997-OhashiYE #interface #using
A Real World Oriented Interface Technique Using Computer Vision (TO, TY, TE), pp. 949–952.
HCIHCI-SEC-1997-PosnerBM #using
Evaluating REAL Users, Using REAL Software, Performing REAL Tasks, in REAL Contexts (IP, RB, AM), pp. 597–600.
HCIHCI-SEC-1997-ShibuyaKT #education #using
Teaching Information Literacy in Technical Courses Using WWW (YS, GK, HT), pp. 723–726.
HCIHCI-SEC-1997-ShinYY #authoring #documentation #multi #parsing #using
Presentation Jockey: Multimedia Authoring System Using Structured Document Parsing (HSS, WJY, KJY), pp. 659–662.
HCIHCI-SEC-1997-SuLYFD #artificial reality #industrial #using
Industrial Training Using Virtual Reality (CJS, FL, LY, CMF, VGD), pp. 989–992.
AdaEuropeAdaEurope-1997-Thornley #case study #development #experience #static analysis
Static Analysis and Diversity in the Software Development Process- Experiences with the Use of SPARK (JPT), pp. 266–277.
AdaTRI-Ada-1997-BattagliaBB #ada #named #reuse
ReUSE/Ada: A Tool to Promote Code Reuse (DB, AB, JB), pp. 113–116.
AdaTRI-Ada-1997-SuchanS #ada #education #problem #using
Using Ada 95 as a Tool to Teach Problem Solving to Non-CS Majors (WKS, TLS), pp. 31–36.
AdaTRI-Ada-1997-Yu #component #object-oriented #reuse #using
Using Object-Oriented Techniques to Develop Reusable Components (HY), pp. 117–124.
CAiSECAiSE-1997-FilippidouL #approach #requirements #using #validation
Using Scenarios to Validate Requirements in a Plausibility Centred Approach (DF, PL), pp. 47–60.
EDOCEDOC-1997-FujisakiHK #distributed #fault tolerance #network #scalability #using
A Scalable Fault-Tolerant Network Management System Built Using Distributed Object Technology (TF, MH, KK), pp. 140–148.
ECIRACIR-1997-Moulinier #feature model #preprocessor
Feature Selection: A Useful Preprocessing Step (IM).
ECIRACIR-1997-Wilkinson #using
Using Combination of Evidence for Term Expansion (RW).
CIKMCIKM-1997-KoczkodajHO #knowledge-based #using
Using Consistency-driven Pairwise Comparisons in Knowledge-based Systems (WWK, MWH, MO), pp. 91–96.
CIKMCIKM-1997-LinR #navigation #using
Using a Sequential Index in Terrain-Aided Navigation (LL, TR), pp. 177–184.
CIKMCIKM-1997-ObermeyerM #using
Evaluating Triggers Using Decision Trees (LO, DPM), pp. 144–150.
CIKMCIKM-1997-SinghSC #concept #documentation #generative #using
Generating Association Rules from Semi-Structured Documents Using an Extended Concept Hierarchy (LS, PS, BC), pp. 193–200.
CIKMCIKM-1997-YoonSP #data mining #mining #query #using
Intensional Query Processing Using Data Mining Approaches (SCY, IYS, EKP), pp. 201–208.
ICMLICML-1997-BalujaD #optimisation #using
Using Optimal Dependency-Trees for Combinational Optimization (SB, SD), pp. 30–38.
ICMLICML-1997-CardieN #predict #using
Improving Minority Class Prediction Using Case-Specific Feature Weights (CC, NN), pp. 57–65.
ICMLICML-1997-Drucker #using
Improving Regressors using Boosting Techniques (HD), pp. 107–115.
ICMLICML-1997-KollerS #documentation #using #word
Hierarchically Classifying Documents Using Very Few Words (DK, MS), pp. 170–178.
ICMLICML-1997-ReddyT #learning #using
Learning Goal-Decomposition Rules using Exercises (CR, PT), pp. 278–286.
ICMLICML-1997-Schapire #learning #multi #problem #using
Using output codes to boost multiclass learning problems (RES), pp. 313–321.
KDDKDD-1997-AliMS #classification #using
Partial Classification Using Association Rules (KA, SM, RS), pp. 115–118.
KDDKDD-1997-ChienFMLG #data analysis #database #image #scalability #using
Using Artificial Intelligence Planning to Automate Science Data Analysis for Large Image Databases (SAC, FF, HM, EL, RG), pp. 147–150.
KDDKDD-1997-KamberHC #mining #multi #using
Metarule-Guided Mining of Multi-Dimensional Association Rules Using Data Cubes (MK, JH, JC), pp. 207–210.
KDDKDD-1997-LiuHC #classification #using
Using General Impressions to Analyze Discovered Classification Rules (BL, WH, SC), pp. 31–36.
KDDKDD-1997-SmythGIRF #clustering #detection #using
Detecting Atmospheric Regimes Using Cross-Validated Clustering (PS, MG, KI, JR, AF), pp. 61–66.
SIGIRSIGIR-1997-AslandoganTYZR #image #retrieval #semantics #using
Using Semantic Contents and WordNet in Image Retrieval (YAA, CT, CTY, JZ, NR), pp. 286–295.
SIGIRSIGIR-1997-ChenHXGM #retrieval #taxonomy #using
Chinese Text Retrieval Without Using a Dictionary (AC, JH, LX, FCG, JM), pp. 42–49.
SIGIRSIGIR-1997-FitzpatrickD #automation #feedback #query #question #social #using
Automatic Feedback Using Past Queries: Social Searching? (LF, MD), pp. 306–313.
SIGIRSIGIR-1997-HearstK #interactive #interface #named #retrieval #scalability #specification #using
Cat-a-Cone: An Interactive Interface for Specifying Searches and Viewing Retrieval Results using a Large Category Hierarchy (MAH, CK), pp. 246–255.
SIGIRSIGIR-1997-KlavansTJ #automation #effectiveness #multi #natural language #semiparsing #speech
Effective Use of Natural Language Processing Techniques for Automatic Conflation of Multi-Word Terms: The Role of Derivational Morphology, Part of Speech Tagging, and Shallow Parsing (ET, JK, CJ), pp. 148–155.
UMLUML-1997-Korthaus #modelling #uml #using
Using UML for Business Object Based Systems Modeling (AK), pp. 220–237.
UMLUML-1997-SchroffT #uml
Conventions for the Practical Use of UML (AS, AT), pp. 262–270.
ECOOPECOOP-1997-MeuselCK #documentation #framework #hypermedia #object-oriented #using
A Model for Structuring User Documentation of Object-Oriented Frameworks Using Patterns and Hypertext (MM, KC, WK), pp. 496–510.
ECOOPECOOP-1997-OdenthalQ #design #documentation #using
Using Patterns for Design and Documentation (GO, KQC), pp. 511–529.
OOPSLAOOPSLA-1997-LitmanMP #modelling #using
Modeling Dynamic Collections of Interdependent Objects Using Path-Based Rules (DJL, AM, PFPS), pp. 77–92.
OOPSLAOOPSLA-1997-Lorenz #case study #design pattern #interpreter #using
Tiling Design Patterns — A Case Study Using the Interpreter Pattern (DHL), pp. 206–217.
TOOLSTOOLS-ASIA-1997-Coplien97a #c++ #programming #using
Advanced C++ Programming Styles: Using C++ as a Higher-Level Language (JC), pp. 418–419.
TOOLSTOOLS-ASIA-1997-Exton #distributed #fault tolerance #interface #specification
Distributed Fault Tolerance Specification through the use of Interface Definitions (CE), pp. 254–259.
TOOLSTOOLS-ASIA-1997-HungLC #experience #network #using
An Experience of Using FDOOA Method to Develop a Telecommunications Network Management System (YSH, WCL, CGC), pp. 320–329.
TOOLSTOOLS-ASIA-1997-PeiYJS #framework #modelling #object-oriented #parallel #using
A Method for Using Object-Oriented Frameworks to Support Various High-Level Parallel Computing Models (LP, DY, LJ, DLS), pp. 151–158.
TOOLSTOOLS-ASIA-1997-Schmidt97b #communication #design pattern #framework #object-oriented #using
Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 422–423.
TOOLSTOOLS-ASIA-1997-SheardH #c++ #case study #concept #education #experience #object-oriented #programming #student #using
Experiences with Teaching Object-Oriented Concepts to Introductory Programming Students Using C++ (JS, DH), pp. 310–319.
TOOLSTOOLS-ASIA-1997-StobartPT #case study #object-oriented #polymorphism #source code #testing #using
Using Extended General Statecharts to Generate Test Cases for Overloaded/Polymorphic Object-Oriented Programs: A Case Study (SS, NP, BYT), pp. 96–103.
TOOLSTOOLS-ASIA-1997-WangMS #case study #design pattern #development #experience #using
Experience Report: Using Design Patterns in the Development of JB System (YW, HM, WS), pp. 159–165.
TOOLSTOOLS-PACIFIC-1997-LakosL #java #specification #using
Animating Formal Specifications Using Java Applets (CL, GL), pp. 196–209.
TOOLSTOOLS-PACIFIC-1997-Schmidt #communication #design pattern #framework #object-oriented #using
Using Design Patterns and Frameworks to Develop Object-Oriented Communication Systems (DCS), pp. 361–362.
TOOLSTOOLS-USA-1997-GilH #debugging #generative #source code #testing #using
T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
TOOLSTOOLS-USA-1997-Jones #corba #using
Using CORBA (GJ), p. 374.
PPDPALP-1997-CodishT #analysis #constraints #logic programming #semantics #source code #termination #using
A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
PPDPPLILP-1997-Patterson #lazy evaluation #using
Transforming Lazy Functions Using Comportment Properties (RP), pp. 111–125.
PPDPPLILP-1997-SparudR #functional #lazy evaluation #using
Tracing Lazy Functional Computations Using Redex Trails (JS, CR), pp. 291–308.
POPLPOPL-1997-Godefroid #model checking #programming language #using
Model Checking for Programming Languages using Verisoft (PG), pp. 174–186.
POPLPOPL-1997-Ruf #analysis #clustering #data flow #using
Partitioning Dataflow Analyses Using Types (ER), pp. 15–26.
POPLPOPL-1997-WandS #semantics #using
Denotational Semantics Using an Operationally-Based Term Model (MW, GTS), pp. 386–399.
RERE-1997-BoisDZ #on the #problem
On the Use of a Formal R. E. Language — The Generalized Railroad Crossing Problem (PDB, ED, JMZ), p. 128–?.
RERE-1997-DanoBB #approach #case study #concept #object-oriented #specification
An Approach Based on the Concept of Use Case to Produce Dynamic Object-Oriented Specifications (BD, HB, FB), pp. 54–64.
RERE-1997-Hall #question #requirements #what
What’s the Use of Requirements Engineering? (AH), p. 2–?.
SACSAC-1997-ChengKK #assessment #concept #fuzzy #representation #using
Knowledge assessment using fuzzy conceptual representation (PC, DK, GK), pp. 3–9.
SACSAC-1997-ChungLLD #equation #using
Effect of data distribution in data assimilation using Burgers’ equation (WC, JML, SL, SKD), pp. 521–526.
SACSAC-1997-FontanaF #documentation #evaluation #fuzzy #using
Using fuzzy grammars for the evaluation of SGML-based documents (FAF, FF), pp. 202–203.
SACSAC-1997-KhasawnehO #evaluation #network #protocol
An evaluation study of protocols used in cable TV networks (RMK, MSO), pp. 52–57.
SACSAC-1997-KozaBAK #evolution #programming #search-based #using
Evolution using genetic programming of a low-distortion, 96 decibel operational amplifier (JRK, FHBI, DA, MAK), pp. 207–216.
SACSAC-1997-LeeLP #approach #empirical #information management #towards #using
Towards Interoperable Heterogeneous Information Systems: An Experiment Using the DIOM Approach (YL, LL, CP), pp. 112–114.
SACSAC-1997-TsaurHC #approach #authentication #data access #distributed #geometry #using
An authentication-combined access control scheme using a geometric approach in distributed systems (WJT, SJH, CHC), pp. 361–365.
ESECESEC-FSE-1997-BodikGS #data flow #using
Refining Data Flow Information Using Infeasible Paths (RB, RG, MLS), pp. 361–377.
ESECESEC-FSE-1997-CheungGK #analysis #composition #liveness #reachability #using #verification
Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
ESECESEC-FSE-1997-DwyerCH #abstraction #model checking #user interface #using #visual notation
Model Checking Graphical User Interfaces Using Abstractions (MBD, VC, LH), pp. 244–261.
ESECESEC-FSE-1997-LandSJ #design #detection #empirical #fault #performance #using #validation
Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
ESECESEC-FSE-1997-RepsBDL #maintenance #problem #profiling
The Use of Program Profiling for Software Maintenance with Applications to the Year 2000 Problem (TWR, TB, MD, JRL), pp. 432–449.
ICSEICSE-1997-Gentleman #component #effectiveness #off the shelf #tutorial
Effective Use of COTS (Commercial-off-the-Shelf) Software Components in Long Lived Systems (Tutorial) (WMG), pp. 635–636.
ICSEICSE-1997-JohnsonT #bibliography #case study #using
Assessing Software Review Meetings: A Controlled Experimental Study Using CSRS (PMJ, DT), pp. 118–127.
ICSEICSE-1997-PerpichPPVW #development #scalability #using #web
Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development (JP, DEP, AAP, LGV, MWW), pp. 14–21.
ICSEICSE-1997-PezzeY #analysis #modelling #multi #semantics #tool support #using
Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
ICSEICSE-1997-SullivanSM #architecture #formal method #standard #using
Using Formal Methods to Reason about Architectural Standards (KJS, JS, MM), pp. 503–513.
HPCAHPCA-1997-QinB #communication #multi #on the #performance
On the Use and Performance of Explicit Communication Primitives in Cache-Coherent Multiprocessor Systems (XQ, JLB), pp. 182–193.
HPDCHPDC-1997-SiuS #design pattern #network #parallel #using
Design Patterns for Parallel Computing using a Network of Processors (SS, AS), pp. 293–304.
HPDCHPDC-1997-Wolski #network #performance #scheduling #using
Forecasting Network Performance to Support Dynamic Scheduling using the Network Weather Service (RW), pp. 316–325.
PPoPPPPoPP-1997-Rinard #automation #effectiveness #source code #using
Effective Fine-Grain Synchronization for Automatically Parallelized Programs Using Optimistic Synchronization Primitives (MCR), pp. 112–123.
CADECADE-1997-DennisBG #bisimulation #induction #proving #using
Using A Generalisation Critic to Find Bisimulations for Coinductive Proofs (LAD, AB, IG), pp. 276–290.
CADECADE-1997-FeltyH #hybrid #interactive #proving #theorem proving #using
Hybrid Interactive Theorem Proving Using Nuprl and HOL (APF, DJH), pp. 351–365.
CADECADE-1997-Matthews #implementation #induction #using
A Practical Implementation of Simple Consequence Relations Using Inductive Definitions (SM), pp. 306–320.
CAVCAV-1997-BultanGP #infinity #model checking #using
Symbolic Model Checking of Infinite State Systems Using Presburger Arithmetic (TB, RG, WP), pp. 400–411.
CAVCAV-1997-Kaivola #composition #using #verification
Using Compositional Preorders in the Verification of Sliding Window Protocal (RK), pp. 48–59.
CAVCAV-1997-MelzerR #concurrent #using
Deadlock Checking Using Net Unfoldings (SM, SR), pp. 352–363.
CAVCAV-1997-RamakrishnanRRSSW #model checking #performance #using
Efficient Model Checking Using Tabled Resolution (YSR, CRR, IVR, SAS, TS, DSW), pp. 143–154.
CAVCAV-1997-Sistla #automaton #invariant #linear #network #using #verification
Parametrized Verification of Linear Networks Using Automata as Invariants (APS), pp. 412–423.
ICLPICLP-1997-BuenoCL #analysis #logic programming #set #source code #using
Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
ICLPICLP-1997-TsuchidaAIY #constraints #logic programming #using
Tree Drawing Using Constraint Logic Programming (KT, YA, TI, TY), p. 414.
ICLPILPS-1997-MonteliusM #using
Using SimICS to Evaluate the Penny System (JM, PSM), pp. 133–147.
RTARTA-1997-Lynch #graph #using
Goal-Directed Completion Using SOUR Graphs (CL), pp. 8–22.
RTARTA-1997-TomasF #equation #geometry #linear #using
Solving Linear Diophantine Equations Using the Geometric Structure of the Solution Space (APT, MF), pp. 269–283.
DACDAC-1996-AraujoML #architecture #code generation #using
Using Register-Transfer Paths in Code Generation for Heterogeneous Memory-Register Architectures (GA, SM, MTCL), pp. 591–596.
DACDAC-1996-BrownMVCGGGLZS #design #experience #multi #programmable #scalability #tool support #using
Experience in Designing a Large-scale Multiprocessor using Field-Programmable Devices and Advanced CAD Tools (SDB, NM, ZGV, SC, AG, RG, MG, KL, ZZ, SS), pp. 427–432.
DACDAC-1996-Dahlgren #logic #simulation #using
Oscillation Control in Logic Simulation using Dynamic Dominance Grahps (PD), pp. 155–160.
DACDAC-1996-DesaiY #cpu #design #simulation #using #verification
A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
DACDAC-1996-EdamatsuIH #design #video
Design Methodologies for consumer-use video signal processing LSIs (HE, SI, KH), pp. 497–502.
DACDAC-1996-GenderenM #performance #using
Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction (AJvG, NPvdM), pp. 758–763.
DACDAC-1996-HansenS #diagrams #synthesis #using
Synthesis by Spectral Translation Using Boolean Decision Diagrams (JPH, MS), pp. 248–253.
DACDAC-1996-IpD #reduction #using
State Reduction Using Reversible Rules (CNI, DLD), pp. 564–567.
DACDAC-1996-LeeHCF #design #modelling #synthesis #using
Domain-Specific High-Level Modeling and Synthesis for ATM Switch Design Using VHDL (MTCL, YCH, BC, MF), pp. 585–590.
DACDAC-1996-LiG #optimisation #using
HDL Optimization Using Timed Decision Tables (JL, RKG), pp. 51–54.
DACDAC-1996-LiM #adaptation #linear #modelling #parametricity #using
Computing Parametric Yield Adaptively Using Local Linear Models (ML, LSM), pp. 831–836.
DACDAC-1996-MiliozziVCMS #design #modelling
Use of Sensitivities and Generalized Substrate Models in Mixed-Signal IC Design (PM, IV, EC, EM, ALSV), pp. 227–232.
DACDAC-1996-OhPP #bound #linear #programming #using
Constructing Lower and Upper Bounded Delay Routing Trees Using Linear Programming (JO, IP, MP), pp. 401–404.
DACDAC-1996-PandeyRBB #array #evaluation #using #verification
Formal Verification of PowerPC Arrays Using Symbolic Trajectory Evaluation (MP, RR, DLB, REB), pp. 649–654.
DACDAC-1996-SemenovY #petri net #using #verification
Verification of asynchronous circuits using Time Petri Net unfolding (ALS, AY), pp. 59–62.
DACDAC-1996-SunDH #equation #geometry #independence #parametricity #performance #using
Fast Parameters Extraction of General Three-Dimension Interconnects Using Geometry Independent Measured Equation of Invariance (WS, WWMD, WHI), pp. 371–376.
DACDAC-1996-XiD #design #power management
Useful-Skew Clock Routing With Gate Sizing for Low Power Design (JGX, WWMD), pp. 383–388.
ASEKBSE-1996-HarmerMB #cobol #knowledge-based #source code #using
Using Knowledge-Based Transformations to Reverse-Engineer COBOL Programs (TJH, PJM, JMB), p. 17.
ASEKBSE-1996-LeeG #collaboration #tutorial #using #web
Developing Collaborative Applications Using the World Wide Web “Shell” (Tutorial) (AL, AG), p. 3.
HTHT-1996-GirgensohnLS #case study #collaboration #experience #using #web
Experiences in Developing Collaborative Applications Using the World Wide Web “Shell” (AG, AL, KS), pp. 246–255.
HTHT-1996-SaltonSBM #automation #composition #using
Automatic Text Decomposition Using Text Segments and Text Themes (GS, AS, CB, MM), pp. 53–65.
PODSPODS-1996-LevyRU #query #using
Answering Queries Using Limited External Processors (AYL, AR, JDU), pp. 227–237.
SIGMODSIGMOD-1996-BohmA #database #documentation #named #object-oriented #using
HyperStorM — Administering Structured Documents Using Object-Oriented Database Technology (KB, KA), p. 547.
SIGMODSIGMOD-1996-FukudaMMT #2d #algorithm #data mining #mining #using #visualisation
Data Mining Using Two-Dimensional Optimized Accociation Rules: Scheme, Algorithms, and Visualization (TF, YM, SM, TT), pp. 13–23.
SIGMODSIGMOD-1996-HullZ #framework #integration #using
A Framework for Supporting Data Integration Using the Materialized and Virtual Approaches (RH, GZ), pp. 481–492.
VLDBVLDB-1996-FaloutsosG #analysis #using
Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
VLDBVLDB-1996-FaloutsosMS #modelling #multi #using
Modeling Skewed Distribution Using Multifractals and the “80-20” Law (CF, YM, AS), pp. 307–317.
VLDBVLDB-1996-FukudaMMT #performance #using
Constructing Efficient Decision Trees by Using Optimized Numeric Association Rules (TF, YM, SM, TT), pp. 146–155.
VLDBVLDB-1996-Hammond #consistency #set #using
Using Referential Integrity To Easily Define Consistent Subset Replicas (BH), p. 591.
VLDBVLDB-1996-Kleewein #database
Practical Issues with Commercial Use of Federated Databases (JK), p. 580.
VLDBVLDB-1996-LevyRO #query #using
Querying Heterogeneous Information Sources Using Source Descriptions (AYL, AR, JJO), pp. 251–262.
VLDBVLDB-1996-Ogawa #documentation #effectiveness #performance #ranking #scalability #using
Effective & Efficient Document Ranking without using a Large Lexicon (YO), pp. 192–202.
VLDBVLDB-1996-Padmanabhan #parallel #scalability #set #using
Extracting Large Data Sets using DB2 Parallel Edition (SP), p. 582.
VLDBVLDB-1996-ShethKMWDLPLS #multi #using #workflow
Supporting State-Wide Immunisation Tracking Using Multi-Paradigm Workflow Technology (APS, KK, JAM, DW, SD, CL, DP, JL, IS), pp. 263–273.
VLDBVLDB-1996-SrivastavaDJL #query #using
Answering Queries with Aggregation Using Views (DS, SD, HVJ, AYL), pp. 318–329.
CSEETCSEE-1996-ShepardBS #automation #education #scalability #tool support
Use of Large, Domain Specific CASE tools in Undergraduate Curricula (TS, BB, MS), pp. 144–148.
CSEETCSEE-1996-TakvorianMZ #education #re-engineering #using #web
Using the World Wide Web to Promote Software Engineering Education (AT, KM, DZ), p. 270–?.
ITiCSEITiCSE-1996-BerginBPMNRWGKJ #bibliography #design #visualisation
An overview of visualization: its use and design: report of the working group in visualization (JB, KB, MPM, MFM, TLN, SHR, JW, MG, SK, RJP), pp. 192–200.
ITiCSEITiCSE-1996-Castaneda #using #visual notation
Windows-based applications in Visual Basic using project teams (SEC), p. 232.
ITiCSEITiCSE-1996-Hartley #education #hypermedia #network #operating system #using
A hypermedia lab manual for operating systems: using the network to teach (SJH), pp. 8–10.
ITiCSEITiCSE-1996-HartleyGJMMPRS #education #interactive #internet #using #web
Enhancing teaching using the Internet: report of the working group on the World Wide Web as an interactive teaching resource (SH, JGP, DJ, CM, MDM, BAP, MR, MKS), pp. 218–228.
ITiCSEITiCSE-1996-KnoxWJKKLMPR #education #guidelines
Use of laboratories in computer science education: guidelines for good practice: report of the working group on computing laboratories (DK, UW, DTJ, EBK, JK, AL, JPM, VKP, KAR), pp. 167–181.
ITiCSEITiCSE-1996-Krone #algorithm #analysis #data type #education #symbolic computation #using
Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
ITiCSEITiCSE-1996-McConnell #learning
Active learning and its use in computer science (JJM), pp. 52–54.
ITiCSEITiCSE-1996-McManusBCST #challenge #education #using
Challenges of using groupware to teach groupware (MMM, CMB, JAC, JS, MBT), pp. 165–166.
ITiCSEITiCSE-1996-McNally #algorithm #data type #education #using #visualisation
Using visualization in teaching data structures and algorithms (MFM), p. 231.
ITiCSEITiCSE-1996-MirandaP #internet #using
Using Internet technology for course support (JEPM, JSP), pp. 96–100.
ITiCSEITiCSE-1996-MutchlerL #multi #programming #user interface #using
Using multimedia and GUI programming in CS 1 (DM, CL), pp. 63–65.
ITiCSEITiCSE-1996-PilgrimL #internet
Appropriate use of the Internet in computer science courses (CJP, YKL), pp. 81–86.
ITiCSEITiCSE-1996-VeraartW #student #using #web
Using CD-ROMs and local Web pages to provide course materials for distance-students (VEV, SLW), pp. 90–92.
ESOPESOP-1996-Bechet #encoding #partial evaluation #using
Removing Value Encoding Using Alternative Values in Partial Evaluation of Strongly-Typed Languages (DB), pp. 77–91.
WRLARWLW-1996-Castro #csp #using
Solving binary CSP using computational systems (CC), pp. 246–265.
TACASTACAS-1996-Lowe #protocol #using
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
TACASTACAS-1996-Rauzy #analysis #constraints #reduction #specification #using
Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (Abstract) (AR), p. 417.
ICSMEICSM-1996-GannodC #c #reverse engineering #source code #using
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 265–274.
ICSMEICSM-1996-MancoridisH #clustering #graph #using
Recovering the Structure of Software Systems Using Tube Graph Interconnection Clustering (SM, RCH), p. 23–?.
ICSMEICSM-1996-MayrandLM #automation #detection #empirical #metric #using
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics (JM, CL, EM), p. 244–?.
ICSMEICSM-1996-MortimerB #abstraction #maintenance #using
Maintenance and abstraction of program data using formal transformations (REM, KHB), p. 301–?.
ICSMEICSM-1996-OwensWG #classification #fault #using
Software Error Classification using Purify (HDO, BFW, MJG), pp. 104–113.
ICSMEICSM-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
WCREWCRE-1996-GannodC #c #reverse engineering #source code #using
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 249–258.
WCREWCRE-1996-Sneed #encapsulation #legacy
Encapsulating Legacy Software for Use in Client/Server Systems (HMS), p. 104–?.
WCREWCRE-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
WPCWPC-1996-Bull #comprehension #domain-specific language #safety #using
Comprehension of Safety-Critical Systems Using Domain-Specific Languages (TB), pp. 108–122.
PLDIPLDI-1996-DawsonRW #case study #logic programming #program analysis #using
Practical Program Analysis Using General Purpose Logic Programming Systems — A Case Study (SD, CRR, DSW), pp. 117–126.
PLDIPLDI-1996-SreedharGL #analysis #data flow #framework #graph #incremental #using
A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
SASSAS-1996-Paterson #compilation #lazy evaluation #using
Compiling Laziness Using Projections (RP), pp. 255–269.
STOCSTOC-1996-CleggEI #algorithm #proving #satisfiability #using
Using the Groebner Basis Algorithm to Find Proofs of Unsatisfiability (MC, JE, RI), pp. 174–183.
STOCSTOC-1996-Milenkovic #linear #programming #strict #using
Translational Polygon Containment and Minimal Enclosure using Linear Programming Based Restriction (VM), pp. 109–118.
CIAAWIA-1996-Schubert #automaton #how #sorting
How to Use Sorting Procedures to Minimize DFA (BS), pp. 159–166.
FMFME-1996-ArnoldBR #debugging #embedded #formal method
An Example of Use of Formal Methods to Debug an Embedded Software (AA, DB, JPR), pp. 649–661.
FMFME-1996-BoigelotG #analysis #model checking #protocol #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
FMFME-1996-ComuzziH #slicing #using
Program Slicing Using Weakest Preconditions (JJC, JMH), pp. 557–575.
FMFME-1996-SeguinW #approach #category theory #fault tolerance #logic #using #validation
Using a Logical and Categorical Approach for the Validation of Fault-Tolerant Systems (CS, VW), pp. 347–366.
ICFPICFP-1996-RojemoR #compilation #profiling #revisited
Lag, Drag, Void and Use — Heap Profiling and Space-Efficient Compilation Revisited (NR, CR), pp. 34–41.
ICFPICFP-1996-SerranoF #analysis
Storage Use Analysis and its Applications (MS, MF), pp. 50–61.
IFLIFL-1996-Assmann #coordination #functional #petri net #process #using
Coordinating Functional Processes Using Petri Nets (CA), pp. 162–183.
CHICHI-1996-Erickson #analysis #design
The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
CHICHI-1996-KambaEHSS #using
Using Small Screen Space More Efficiently (TK, SAE, TH, TS, PNS), pp. 383–390.
CHICHI-1996-Miller #approach #development #multi #using
Integrating Human Factors in Customer Support Systems Development Using a Multi-Level Organisational Approach (AM), pp. 368–375.
CHICHI-1996-RiceFPG #using #web
Using the Web Instead of a Window System (JR, AF, PP, TRG), pp. 103–110.
CHICHI-1996-VirziSK #identification #problem #prototype #usability #using
Usability Problem Identification Using Both Low- and High-Fidelity Prototypes (RAV, JLS, DK), pp. 236–243.
CSCWCSCW-1996-HillT #social #using
Using Frequency-of-Mention in Public Conversations for Social Filtering (WCH, LGT), pp. 106–112.
CSCWCSCW-1996-KawaiBT #multi #named #using #video
ARGUS: An Active Awareness System Using Computer-Controlled Multiple Cameras (Video Program) (TK, YB, HT), p. 7.
CSCWCSCW-1996-LeeG #collaboration #tutorial #using #web
Developing Collaborative Applications Using the World Wide Web Shell (Tutorial) (AL, AG), p. 4.
CSCWCSCW-1996-Waldo #collaboration #java #programming #tutorial #using
Using the Java Programming Environment to Build Collaborative Applications (Tutorial) (JW), p. 3.
CSCWCSCW-1996-Yankelovich #collaboration #education #how #internet #tutorial
An Introduction to the Internet and How it can be Used for Collaboration for K-12 Teachers (Tutorial) (NY), p. 3.
AdaEuropeAdaEurope-1996-FletcherS #framework #object-oriented #specification #testing #using
A Framework for Testing Object-Oriented Software Using Formal Specifications (RF, ASMS), pp. 159–170.
AdaEuropeAdaEurope-1996-LundqvistW #ada #object-oriented #using
Using Object-Oriented Methods in Ada 95 to Implement Linda (KL, GW), pp. 211–222.
AdaEuropeAdaEurope-1996-RealEC #ada #prototype #realtime #using
Using Ada 95 for Prototyping Real-Time Systems (JR, AE, AC), pp. 262–274.
AdaEuropeAdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
AdaEuropeAdaEurope-1996-Waroquiers #ada #exclamation #memory management
Ada Tasking and Dynamic Memory: To Use or Not To Use, That’s a Question! (PW), pp. 460–470.
AdaTRI-Ada-1996-Gramp #architecture #communication #comparison #mobile
A Comparison of Different Tasking Architectures Used in Mobile Satellite Communication Ground Station Software (KJG), pp. 23–28.
AdaTRI-Ada-1996-NebeshF #ada #component #html #learning #using
Learning to Use Ada 95 Components Using HTML Linking (BN, MBF), pp. 207–210.
AdaTRI-Ada-1996-Pettit #ada #design #distributed #realtime #using
Using Ada 95 for the Design of Distributed Real-Time Systems (RGPI), pp. 49–55.
CAiSECAiSE-1996-KroneKHDE #case study #information management #using
Developing an Information System Using TROLL: An Application Field Study (MK, MK, PH, GD, HDE), pp. 136–159.
CAiSECAiSE-1996-LammariLJC #constraints #normalisation #using
Deriving Normalized Is_a Hierarchies by Using Applicability Constraints (NL, RL, MJ, XC), pp. 562–580.
KDDAKDDM-1996-HsuK #induction #learning #optimisation #query #semantics #using
Using Inductive Learning To Generate Rules for Semantic Query Optimization (CNH, CAK), pp. 425–445.
CIKMCIKM-1996-ChingHW #database #estimation
A Model of Object Database Applications and its Use in Cost Estimation (NC, EH, MW), pp. 125–133.
CIKMCIKM-1996-LeePHC #composition #query #using
Spatial Query Processing Using Object Decomposition Method (YJL, HHP, NHH, CWC), pp. 53–61.
CIKMCIKM-1996-Pulido #graph #query #recursion #traversal #using
Recursive Query Processing Using Graph Traversal Techniques (EP), pp. 37–44.
ICMLICML-1996-AbeL #learning #modelling #using #word
Learning Word Association Norms Using Tree Cut Pair Models (NA, HL), pp. 3–11.
ICMLICML-1996-DonohoR #induction #using
Constructive Induction Using Fragmentary Knowledge (SKD, LAR), pp. 113–121.
ICMLICML-1996-HelmboldSSW #multi #online #using
On-Line Portfolio Selection Using Multiplicative Updates (DPH, RES, YS, MKW), pp. 243–251.
ICMLICML-1996-OliverBW #learning #using
Unsupervised Learning Using MML (JJO, RAB, CSW), pp. 364–372.
ICMLICML-1996-Suzuki #algorithm #learning #network #performance #using
Learning Bayesian Belief Networks Based on the Minimum Description Length Principle: An Efficient Algorithm Using the B & B Technique (JS), pp. 462–470.
ICPRICPR-1996-AraujoBPD #using
Pursuit control in a binocular active vision system using optical flow (HA, JB, PP, JD), pp. 313–317.
ICPRICPR-1996-Ayoung-CheeDF #3d #hybrid #representation #using
Enhanced 3D representation using a hybrid model (NAC, GD, FPF), pp. 575–579.
ICPRICPR-1996-AzarbayejaniP #3d #estimation #realtime #self #using
Real-time self-calibrating stereo person tracking using 3-D shape estimation from blob features (AA, AP), pp. 627–632.
ICPRICPR-1996-BalaDHVW #architecture #detection #hybrid #search-based #using #visual notation
Visual routine for eye detection using hybrid genetic architectures (JWB, KD, JH, HV, HW), pp. 606–610.
ICPRICPR-1996-Bayro-CorrochanoBS #algebra #geometry #network #self #using
A new self-organizing neural network using geometric algebra (EBC, SB, GS), pp. 555–559.
ICPRICPR-1996-Bayro-CorrochanoLS #algebra #framework #geometry #using
Geometric algebra: a framework for computing point and line correspondences and projective structure using n uncalibrated cameras (EBC, JL, GS), pp. 334–338.
ICPRICPR-1996-BelloK #analysis #using
Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
ICPRICPR-1996-BimboP #effectiveness #image #retrieval #using
Effective image retrieval using deformable templates (ADB, PP), pp. 120–124.
ICPRICPR-1996-BimboP96a #image #using #visual notation
Image indexing using shape-based visual features (ADB, PP), pp. 351–355.
ICPRICPR-1996-BrucksteinRW #invariant #using
Recognizing objects using scale space local invariants (AMB, ER, IW), pp. 760–764.
ICPRICPR-1996-CaiA #multi #using
Tracking human motion using multiple cameras (QC, JKA), pp. 68–72.
ICPRICPR-1996-CallariF #ambiguity #nondeterminism #recognition #using
Active recognition: using uncertainty to reduce ambiguity (FGC, FPF), pp. 925–929.
ICPRICPR-1996-CamusCHH #realtime #using
Real-time single-workstation obstacle avoidance using only wide-field flow divergence (TC, DC, MH, THH), pp. 323–330.
ICPRICPR-1996-CesarC #energy #multi #using
Shape characterization in natural scales by using the multiscale bending energy (RMCJ, LdFC), pp. 735–739.
ICPRICPR-1996-ChehadehCB #adaptation #algorithm #distance #using
A skeletonization algorithm using chamfer distance transformation adapted to rectangular grids (YC, DC, PB), pp. 131–135.
ICPRICPR-1996-Chen #detection #parallel
The use of hidden deletable pixel detection to obtain bias-reduced skeletons in parallel thinning (YSC), pp. 91–95.
ICPRICPR-1996-ChenHW #feature model #geometry #image #modelling #recognition #using
Model-based object recognition using range images by combining morphological feature extraction and geometric hashing (CSC, YPH, JLW), pp. 565–569.
ICPRICPR-1996-ChenL96c #novel #using
A novel form structure extraction method using strip projection (JLC, HJL), pp. 823–827.
ICPRICPR-1996-ChenLC #analysis #classification #sequence #using
Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
ICPRICPR-1996-ChenY #symmetry #using #visual notation
Thinning noisy binary patterns using human visual symmetry (YSC, YTY), pp. 146–150.
ICPRICPR-1996-ChetverikovLKH #classification #using
Zone classification using texture features (DC, JL, JK, RMH), pp. 676–680.
ICPRICPR-1996-ChiaCY #re-engineering #using
Curved surface reconstruction using a simple structured light method (TLC, ZC, CJY), pp. 844–848.
ICPRICPR-1996-ChungH #2d #3d #modelling #re-engineering #using
Using 2D active contour models for 3D reconstruction from serial sections (RC, CkH), pp. 849–853.
ICPRICPR-1996-CordellaFSV #algorithm #graph #performance #using
An efficient algorithm for the inexact matching of ARG graphs using a contextual transformational model (LPC, PF, CS, MV), pp. 180–184.
ICPRICPR-1996-CourtneyA #image #multi #segmentation #using
Segmentation of volume images using a multiscale transform (TC, NA), pp. 432–436.
ICPRICPR-1996-DarrellP #gesture #markov #process #recognition #using
Active gesture recognition using partially observable Markov decision processes (TD, AP), pp. 984–988.
ICPRICPR-1996-DayP #generative #network #using
The generation of motion kinematics using a time-delay neural network (MJSD, JSP), pp. 545–549.
ICPRICPR-1996-DeguchiN #interactive #matrix #using #visual notation
Visual servoing using eigenspace method and dynamic calculation of interaction matrices (KD, TN), pp. 302–306.
ICPRICPR-1996-DemsarS #image #machine learning #using
Using machine learning for content-based image retrieving (JD, FS), pp. 138–142.
ICPRICPR-1996-DePieroT #adaptation #image #kernel #realtime #segmentation #using
Real-time range image segmentation using adaptive kernels and Kalman filtering (FWD, MMT), pp. 573–577.
ICPRICPR-1996-DeruyverH #automation #image #multi #segmentation #using
Automatic multi-thresholdable image segmentation by using separating bipoints (AD, YH), pp. 457–461.
ICPRICPR-1996-DiasBD #classification #identification
Results of the use of Bayesian classifiers for identification of breast cancer cell nuclei (ÂVD, FB, MRD), pp. 508–512.
ICPRICPR-1996-DunkerHS #3d #estimation #prototype #recognition #set #using
Single view recognition and pose estimation of 3D objects using sets of prototypical views and spatially tolerant contour representations (JD, GH, MS), pp. 14–18.
ICPRICPR-1996-EggertFF #multi #reverse engineering
Simultaneous registration of multiple range views for use in reverse engineering (DWE, AWF, RBF), pp. 243–247.
ICPRICPR-1996-GreenhillFJ #image #using
Analysing interferometric images using the Hough transform (DG, PF, GAJ), pp. 844–848.
ICPRICPR-1996-GrobelH #realtime #recognition #using
Video-based handshape recognition using a handshape structure model in real time (KG, HH), pp. 446–450.
ICPRICPR-1996-GunnN #bound #energy #using
Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
ICPRICPR-1996-GuttaHTW #network #recognition #using
Face recognition using ensembles of networks (SG, JH, BT, HW), pp. 50–54.
ICPRICPR-1996-Hachimura #retrieval #using
Retrieval of paintings using principal color information (KH), pp. 130–134.
ICPRICPR-1996-HamamotoUWYT #recognition #using
Recognition of handwritten numerals using Gabor features (YH, SU, MW, TY, ST), pp. 250–253.
ICPRICPR-1996-HansenS #estimation #using
Active depth estimation with gaze and vergence control using Gabor filters (MH, GS), pp. 287–291.
ICPRICPR-1996-HarukiHYY #3d #automation #using #verification
Automatic seal verification using three-dimensional reference seals (HH, TH, HY, KY), pp. 199–203.
ICPRICPR-1996-HataSKK #algorithm #search-based #using
Shape extraction of transparent object using genetic algorithm (SH, YS, SK, KK), pp. 684–688.
ICPRICPR-1996-HeidemannR #3d #architecture #recognition #using
A neural 3-D object recognition architecture using optimized Gabor filters (GH, HJR), pp. 70–74.
ICPRICPR-1996-HepplewhiteS #classification #pattern matching #pattern recognition #recognition #using
Texture classification using n-tuple pattern recognition (LH, TJS), pp. 159–163.
ICPRICPR-1996-HeydenR #evaluation #using
Evaluation of corner extraction schemes using invariance methods (AH, KR), pp. 895–899.
ICPRICPR-1996-Hirayama #image #using
Analyzing form images by using line-shared-adjacent cell relations (YH), pp. 768–772.
ICPRICPR-1996-HolderTM #mobile #navigation #using
Mobile robot navigation by wall following using a rotating ultrasonic scanner (MBH, MMT, SBM), pp. 298–302.
ICPRICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics #using
Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
ICPRICPR-1996-HuangPC #using
Shape from shading using Ritz method with tent basis (CKH, CP, WTC), pp. 398–402.
ICPRICPR-1996-HuijsmansL #image #performance #retrieval #using
Efficient content-based image retrieval in digital picture collections using projections: (near)-copy location (DPH, MSL), pp. 104–108.
ICPRICPR-1996-HusseinNO #analysis #using
Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
ICPRICPR-1996-HwangH #approach #using
Performing temporal action with a hand-eye system using the SHOSLIF approach (WSH, SJH), pp. 35–39.
ICPRICPR-1996-IoannouD #detection #image
Parallelogram detection in a digital image with the use of the Hough transform (DI, ETD), pp. 532–536.
ICPRICPR-1996-IwaiWYY #gesture #recognition #using
Gesture recognition using colored gloves (YI, KW, YY, MY), pp. 662–666.
ICPRICPR-1996-Jaeger #optimisation #recognition #using
Recovering writing traces in off-line handwriting recognition: using a global optimization technique (SJ0), pp. 150–154.
ICPRICPR-1996-JengLLC #approach #detection #geometry #performance #using
An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
ICPRICPR-1996-JiangM #geometry #using
Geometric primitive extraction using tabu search (TJ, SM), pp. 266–269.
ICPRICPR-1996-Johnson #automation #programming #search-based #using #visual notation
Automated creation of visual routines using genetic programming (MPJ), pp. 951–956.
ICPRICPR-1996-KamataNK #image #using
A gray image compression using a Hilbert scan (SiK, MN, EK), pp. 905–909.
ICPRICPR-1996-KindratenkoE #classification #fourier #using
Classification of irregularly shaped micro-objects using complex Fourier descriptors (VVK, PJMVE), pp. 285–289.
ICPRICPR-1996-Kita #using
Force-based registration method using attribute values (YK), pp. 34–39.
ICPRICPR-1996-KlemencicPK #diagrams #image #modelling #segmentation #using
Segmentation of muscle fibre images using Voronoi diagrams and active contour models (AK, FP, SK), pp. 538–542.
ICPRICPR-1996-KnechtS #geometry #modelling #using
Finding map correspondence using geometric models (JdK, KS), pp. 755–759.
ICPRICPR-1996-KoschanRS #using
Color stereo vision using hierarchical block matching and active color illumination (AK, VR, KS), pp. 835–839.
ICPRICPR-1996-KudoS #classification #using
Selection of classifiers based on the MDL principle using the VC dimension (MK, MS), pp. 886–890.
ICPRICPR-1996-LambertN #invariant #using
Discrimination properties of invariants using the line moments of vectorized contours (GL, JN), pp. 735–739.
ICPRICPR-1996-LanserZ #constraints #on the #recognition
On the use of topological constraints within object recognition tasks (SL, CZ), pp. 580–584.
ICPRICPR-1996-LasakulAK #analysis #formal method #image #linear #multi #using
A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
ICPRICPR-1996-Lemaire #nondeterminism #recognition
Use of a priori descriptions in a high-level language and management of the uncertainty in a scene recognition system (JL), pp. 560–564.
ICPRICPR-1996-LengagneFM #re-engineering #using
Using crest lines to guide surface reconstruction from stereo (RL, PF, OM), pp. 9–13.
ICPRICPR-1996-LiaoA #using
Curve and surface interpolation using rational radial basis functions (WHL, JKA), pp. 8–13.
ICPRICPR-1996-LinF #fourier #re-engineering #slicing #theorem #using
Range data reconstruction using Fourier slice theorem (SSL, CSF), pp. 874–878.
ICPRICPR-1996-LingrandV #3d #modelling #using
Dynamic foveal 3D sensing using affine models (DL, TV), pp. 810–814.
ICPRICPR-1996-LinL #detection #using
Detection of specularity using stereo in color and polarization space (SL, SWL), pp. 263–267.
ICPRICPR-1996-LinLC #3d #modelling #using
Recovery of 3-D closed surfaces using progressive shell models (RL, WCL, CTC), pp. 95–99.
ICPRICPR-1996-LiuCC #graph #online #order #recognition #relational #using
Stroke order and stroke number free on-line Chinese character recognition using attributed relational graph matching (JL, WkC, MMYC), pp. 259–263.
ICPRICPR-1996-LiuL #approach #classification #effectiveness #performance #using
An efficient and effective texture classification approach using a new notion in wavelet theory (JFL, JCML), pp. 820–824.
ICPRICPR-1996-LladosLM #comprehension #documentation #graph #using
Hand drawn document understanding using the straight line Hough transform and graph matching (JL, JLK, EM), pp. 497–501.
ICPRICPR-1996-ManabeI #image #recognition #using
Recognition of material types using spectral image (YM, SI), pp. 840–843.
ICPRICPR-1996-MatsuoFI #3d #adaptation #recognition #using
3-D object recognition using adaptive scale MEGI (HM, JF, AI), pp. 117–122.
ICPRICPR-1996-Mel #3d #approach #multi #named #recognition #using #visual notation
SEEMORE: a view-based approach to 3-D object recognition using multiple visual cues (BWM), pp. 570–574.
ICPRICPR-1996-MichaelisSSM #adaptation #network #using
Adaptive filtering of distorted displacement vector fields using artificial neural networks (BM, OS, US, RM), pp. 335–339.
ICPRICPR-1996-MizukamiK #algorithm #recognition #using
A handwritten character recognition system using hierarchical displacement extraction algorithm (YM, KK), pp. 160–164.
ICPRICPR-1996-ModayurS #3d #statistics #using
3D matching using statistically significant groupings (BRM, LGS), pp. 238–242.
ICPRICPR-1996-MorimotoYD #gesture #markov #modelling #recognition #using
Recognition of head gestures using hidden Markov models (CM, YY, LSD), pp. 461–465.
ICPRICPR-1996-Nagao #2d #using
Direct methods for evaluating the planarity and rigidity of a surface using only 2D views (KN), pp. 417–422.
ICPRICPR-1996-NamuduriRR #algorithm #image #named #segmentation #slicing #using
SVBS: a high-resolution medical image compression algorithm using slicing with variable block size segmentation (KRN, NR, HR), pp. 919–923.
ICPRICPR-1996-NgT #multi #using
Multirobot convoying using neuro-fuzzy control (KCN, MMT), pp. 417–421.
ICPRICPR-1996-NishimuraK0HNNO #image #locality #using
Effect of time-spatial size of motion image for localization by using the spotting method (TN, HK, YI, AH, SN, SN, RO), pp. 191–195.
ICPRICPR-1996-OgiharaNY #image #using
Data embedding into pictorial images with less distortion using discrete cosine transform (TO, DN, NY), pp. 675–679.
ICPRICPR-1996-OhbaI #multi #recognition #using
Recognition of the multi-specularity objects using the eigen-window (KO, KI), pp. 692–696.
ICPRICPR-1996-OhyaK #algorithm #detection #image #search-based #using
Detecting facial expressions from face images using a genetic algorithm (JO, FK), pp. 649–653.
ICPRICPR-1996-OkamotoYSY #network #online #string #using
On-line handwriting character string separation method using network expression (MO, HY, KS, KY), pp. 422–425.
ICPRICPR-1996-PaikCLL #multi #using
Multiple recognizers system using two-stage combination (JP, SBC, KL, YL), pp. 581–585.
ICPRICPR-1996-ParagiosT #algorithm #detection #using
Detection and location of moving objects using deterministic relaxation algorithms (NP, GT), pp. 201–205.
ICPRICPR-1996-PauwelsFG #adaptation #algorithm #using
Autonomous grouping of contour-segments using an adaptive region-growing algorithm (EJP, PF, LJVG), pp. 586–590.
ICPRICPR-1996-PrantlGP #multi #network #using
Active fusion using Bayesian networks applied to multi-temporal remote sensing imagery (MP, HG, AP), pp. 890–894.
ICPRICPR-1996-PulliS #modelling #probability #recognition #using
Triplet-based object recognition using synthetic and real probability models (KP, LGS), pp. 75–79.
ICPRICPR-1996-RamaswamyNR #composition #image #using
Lossless image compression using wavelet decomposition (VNR, KRN, NR), pp. 924–928.
ICPRICPR-1996-SaberT #cost analysis #detection #feature model #symmetry #using
Face detection and facial feature extraction using color, shape and symmetry-based cost functions (ES, AMT), pp. 654–658.
ICPRICPR-1996-SainzS #context-sensitive grammar #learning #modelling #using
Learning bidimensional context-dependent models using a context-sensitive language (MS, AS), pp. 565–569.
ICPRICPR-1996-SaitoM #algorithm #image #modelling #multi #search-based #using
Object modeling from multiple images using genetic algorithms (HS, MM), pp. 669–673.
ICPRICPR-1996-SchieleC #multi #probability #recognition #using
Probabilistic object recognition using multidimensional receptive field histograms (BS, JLC), pp. 50–54.
ICPRICPR-1996-SchwartzLMRZ #independence #recognition #speech #using
Language-independent OCR using a continuous speech recognition system (RMS, CL, JM, CR, YZ), pp. 99–103.
ICPRICPR-1996-SeitzD #representation #towards #using
Toward image-based scene representation using view morphing (SMS, CRD), pp. 84–89.
ICPRICPR-1996-SenguptaB #clustering #using
Using spectral features for modelbase partitioning (KS, KLB), pp. 65–69.
ICPRICPR-1996-SerraS #image #network #using
Perceptual grouping on texture images using non-cartesian networks (JRS, JBSV), pp. 462–466.
ICPRICPR-1996-Singh #detection #recognition #using
Shape detection using gradient features for handwritten character recognition (SPS), pp. 145–149.
ICPRICPR-1996-Skubalska-RafajlowiczK #classification #metric #performance #using
Fast k-NN classification rule using metric on space-filling curves (ESR, AK), pp. 121–125.
ICPRICPR-1996-SmitsD #adaptation #approach #image #markov #random #segmentation #using
Information fusion in a Markov random field-based image segmentation approach using adaptive neighbourhoods (PCS, SGD), pp. 570–575.
ICPRICPR-1996-SobottkaP #using
Extraction of facial regions and features using color and shape information (KS, IP), pp. 421–425.
ICPRICPR-1996-SoiferKKS #identification #using
Fingerprint identification using the directions field (VAS, VVK, SNK, RVS), pp. 586–590.
ICPRICPR-1996-StefanoFTV #distance #using
A distance measure for structural descriptions using circular arcs as primitives (CDS, PF, FT, MV), pp. 290–294.
ICPRICPR-1996-StoschekYH #2d #detection #invariant #multi #robust #using
Rotation-invariant and robust multiple-2D-object detection using steerable pyramid denoising and optimized circular harmonic filters (AS, TPYY, RH), pp. 376–380.
ICPRICPR-1996-TakacsW #detection #using
Attention and pattern detection using sensory and reactive control mechanisms (BT, HW), pp. 19–23.
ICPRICPR-1996-TakatooOK #detection #image #using
Detection of objects including persons using image processing (MT, CO, YK), pp. 466–472.
ICPRICPR-1996-TanakaI96a #recognition #using
Curvature-based face surface recognition using spherical correlation-principal directions for curved object recognition (HTT, MI), pp. 638–642.
ICPRICPR-1996-TatsunoSYIT #analysis #image #synthesis #using
Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
ICPRICPR-1996-ThayerG #constraints #design #using
Designing stereo heads using task domain constraints (SMT, CSG), pp. 820–824.
ICPRICPR-1996-TianT96a #3d #algorithm #image #search-based #sequence #using
3D shape recovery from two-color image sequences using a genetic algorithm (YlT, HTT), pp. 674–678.
ICPRICPR-1996-TingL #classification #string #using
Business form classification using strings (AT, MKHL), pp. 690–694.
ICPRICPR-1996-TozakiKNOEM #3d #analysis #image #using
Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
ICPRICPR-1996-TsurutaTA #constraints #image #re-engineering #using
Image reconstruction using high-level constraints (NT, RiT, MA), pp. 401–405.
ICPRICPR-1996-UtsumiMKN #gesture #multi #recognition #using
Hand gesture recognition system using multiple cameras (AU, TM, FK, RN), pp. 667–671.
ICPRICPR-1996-VarstaK #generative #modelling #self #using
Surface modeling and robot path generation using self-organization (MV, PK), pp. 30–34.
ICPRICPR-1996-VinodM #using
Object location using complementary color features: histogram and DCT (VVV, HM), pp. 554–559.
ICPRICPR-1996-VitulanoNVM #detection #using
Edge detection using a new definition of entropy (SV, MN, DV, CM), pp. 141–145.
ICPRICPR-1996-WakaharaNMO #online #recognition #using
On-line cursive Kanji character recognition using stroke-based affine transformation (TW, NN, SM, KO), pp. 204–209.
ICPRICPR-1996-Webb #feature model #multi #scalability #using
Nonlinear feature extraction with radial basis functions using a weighted multidimensional scaling stress measure (ARW), pp. 635–639.
ICPRICPR-1996-WebbG #estimation #using
Source position estimation using radial basis functions (ARW, PNG), pp. 3–7.
ICPRICPR-1996-WorringW #analysis #using
Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
ICPRICPR-1996-WuL #3d #segmentation #using
3D part segmentation using simulated electrical charge distributions (KW, MDL), pp. 14–18.
ICPRICPR-1996-YagiNYY #estimation #image #mobile #using
Rolling motion estimation for mobile robot by using omnidirectional image sensor HyperOmniVision (YY, WN, KY, MY), pp. 946–950.
ICPRICPR-1996-YimBA #segmentation #using
Bayesian range segmentation using focus cues (CY, ACB, JKA), pp. 482–486.
ICPRICPR-1996-YipP #detection #representation #using
Detection of moving objects using a spatiotemporal representation (HMY, TCP), pp. 483–487.
ICPRICPR-1996-ZhangB #automation #image #recognition #using
Automatic model construction for object recognition using ISAR images (SZ, BB), pp. 169–173.
ICPRICPR-1996-ZhaNN #3d #algorithm #image #modelling #recognition #using
3-D object recognition from range images by using a model-based Hopfield-style matching algorithm (HZ, HN, TN), pp. 111–116.
ICPRICPR-1996-ZhengMFA #3d #modelling #re-engineering #using
Reconstruction of 3D models from specular motion using circular lights (JYZ, AM, YF, NA), pp. 869–873.
KDDKDD-1996-CiesielskiP #bibliography #database #hybrid #mining #using
Using a Hybrid Neural/Expert System for Data Base Mining in Market Survey Data (VC, GP), pp. 38–43.
KDDKDD-1996-Feelders #learning #modelling #using
Learning from Biased Data Using Mixture Models (AJF), pp. 102–107.
KDDKDD-1996-HofackerHSS #information management #product line #scalability #sequence #using
Knowledge Discovery in RNA Sequence Families of HIV Using Scalable Computers (ILH, MAH, PFS, PES), pp. 20–25.
KDDKDD-1996-IglesiaDR #database #heuristic #using
Discovering Knowledge in Commercial Databases Using Modern Heuristic Techniques (BdlI, JCWD, VJRS), pp. 44–49.
KDDKDD-1996-LakshminarayanHGS #machine learning #using
Imputation of Missing Data Using Machine Learning Techniques (KL, SAH, RPG, TS), pp. 140–145.
KDDKDD-1996-Lange #approach #empirical #predict #recursion #using
An Empirical Test of the Weighted Effect Approach to Generalized Prediction Using Recursive Neural Nets (RL), pp. 183–188.
KDDKDD-1996-MannilaT #using
Discovering Generalized Episodes Using Minimal Occurrences (HM, HT), pp. 146–151.
KDDKDD-1996-MannilaT96a #multi #set
Multiple Uses of Frequent Sets and Condensed Representations (Extended Abstract) (HM, HT), pp. 189–194.
KDDKDD-1996-RyuE #programming #query #search-based #using
Deriving Queries from Results Using Genetic Programming (TWR, CFE), pp. 303–306.
KDDKDD-1996-ShanZHC #classification #database #set #using
Discovering Classification Knowledge in Databases Using Rough Sets (NS, WZ, HJH, NC), pp. 271–274.
KDDKDD-1996-Smyth #clustering #monte carlo #using
Clustering Using Monte Carlo Cross-Validation (PS), pp. 126–133.
KDDKDD-1996-TeranoI #induction #information management #interactive #learning #using
Interactive Knowledge Discovery from Marketing Questionnaire Using Simulated Breeding and Inductive Learning Methods (TT, YI), pp. 279–282.
KDDKDD-1996-WangW #representation #using
Representing Discovered Patterns Using Attributed Hypergraph (YW, AKCW), pp. 283–286.
KRKR-1996-Costello #modelling #using
Modeling Belief Change using Counterfactuals (TC), pp. 432–443.
KRKR-1996-Kelley #calculus #case study #modelling #problem #using
Modeling Complex Systems in the Situation Calculus: A Case Study Using the Dagstuhl Steam Boiler Problem (TGK), pp. 26–37.
KRKR-1996-Sandewall #constraints
Assessments of Ramification Methods that Use Static Domain Constraints (ES), pp. 99–110.
KRKR-1996-TeijeH #approximate #using
Computing Approximate Diagnoses By Using Approximate Entailment (AtT, FvH), pp. 256–265.
SEKESEKE-1996-ChangDC #approach #fuzzy #metric #usability #using
Measurement of Usability of Software Using a Fuzzy Systems Approach (EC, TSD, DC), pp. 69–76.
SEKESEKE-1996-HwangCWS #3d #performance #using #visualisation
A Fast 3-D Visualization Methodology Using Characteristic Views of Objects (SH, SYC, TW, PCYS), pp. 577–584.
SEKESEKE-1996-KangB #design #using #visualisation
Using Design Cohesion to Visualize, Quantify, and Restructure Software (BKK, JMB), pp. 222–229.
SEKESEKE-1996-Robertson #empirical #specification #tool support
An Empirical Study of the LSS Specification Toolkit in Use (DSR), pp. 153–160.
SIGIRSIGIR-1996-LeeA #n-gram #retrieval #using
Using n-Grams for Korean Text Retrieval (JHL, JSA), pp. 216–224.
SIGIRSIGIR-1996-RollekeF #logic #retrieval #using
Retrieval of Complex Objects Using a Four-Valued Logic (TR, NF), pp. 206–214.
SIGIRSIGIR-1996-SheridanB #information retrieval #multi #using
Experiments in Multilingual Information Retrieval Using the SPIDER System (PS, JPB), pp. 58–65.
SIGIRSIGIR-1996-SmeatonQ #image #retrieval #semantics #using #word
Experiments on Using Semantic Distances Between Words in Image Caption Retrieval (AFS, IQ), pp. 174–180.
SIGIRSIGIR-1996-XuC #analysis #documentation #query #using
Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
ECOOPECOOP-1996-BullatS #clustering #database #effectiveness
Dynamic Clustering in Object Databases Exploiting Effective Use of Relationships Between Objects (FB, MS), pp. 344–365.
ECOOPECOOP-1996-KonoKM #distributed #implementation #memory management #using
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
ECOOPECOOP-1996-SilvaC #concept #database #design #diagrams #multi #object-oriented #using
Conceptual Design of Active Object-Oriented Database Applications Using Multi-level Diagrams (MJVS, CRC), pp. 366–397.
OOPSLAOOPSLA-1996-BardouD
Split Objects: a Disciplined Use of Delegation within Objects (DB, CD), pp. 122–137.
OOPSLAOOPSLA-1996-EcklundDF #case study #identification #requirements
Change Cases: Use Cases that Identify Future Requirements (EFEJ, LMLD, MJF), pp. 342–358.
OOPSLAOOPSLA-1996-VanHilstN #component #design #using
Using Role Components to Implement Collaboration-Based Designs (MVH, DN), pp. 359–369.
OOPSLAOOPSLA-1996-Yelland #case study #design pattern #framework
Creating Host Compliance in a Portable Framework: A Study in the Use of Existing Design Patterns (PMY), pp. 18–29.
PPDPALP-1996-Marchiori96a #abstract domain #first-order #logic #using
Prime Factorizations of Abstract Domains Using First Order Logic (EM), pp. 209–223.
PPDPPLILP-1996-Bagnara #implementation #using
A Reactive Implementation of Pos Using ROBDDs (RB), pp. 107–121.
PPDPPLILP-1996-BenaissaLR #modelling #recursion #reduction #using
Modeling Sharing and Recursion for Weak Reduction Strategies Using Explicit Substitution (ZEAB, PL, KHR), pp. 393–407.
PPDPPLILP-1996-StuckeyT #constraints #logic programming #modelling #probability #theorem proving #using
Models for Using Stochastic Constraint Solvers in Constraint Logic Programming (PJS, VT), pp. 423–437.
POPLPOPL-1996-HughesPS #correctness #proving #using
Proving the Correctness of Reactive Systems Using Sized Types (JH, LP, AS), pp. 410–423.
POPLPOPL-1996-Jones #composition #using
Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
REICRE-1996-NobeW #lessons learnt #modelling #requirements #using
Lessons Learned from a Trial Application of Requirements Modeling Using Statecharts (CRN, WEW), pp. 86–93.
REICRE-1996-RollandP #modelling #process #using
Using Generic Method Chunks to Generate Process Models Fragments (CR, VP), pp. 173–181.
SACSAC-1996-AbualiWS #algorithm #design #problem #search-based #set #using
Solving the subset interconnection design problem using genetic algorithms (FNA, RLW, DAS), pp. 299–304.
SACSAC-1996-Asgharzadeh #analysis #fuzzy #image #rule-based #using
Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
SACSAC-1996-Boulet #development #multi #using
Using multimedia to emphasize the development of professional abilities (MMB), pp. 110–114.
SACSAC-1996-ChungLLD #behaviour #comparison #using
A comparison of variational data assimilation and nudging using a simple dynamical system with chaotic behavior (WC, JML, SL, SKD), pp. 454–462.
SACSAC-1996-Cripps #performance #predict #using
Using artificial neural nets to predict academic performance (AC), pp. 33–37.
SACSAC-1996-Duben #statistics #using
Conformational statistics of the nitrogen linkage in glycopeptides using umbrella sampling (AJD), pp. 38–43.
SACSAC-1996-DurandAN #algorithm #automation #search-based #using
Automatic aircraft conflict resolution using genetic algorithms (ND, JMA, JN), pp. 289–298.
SACSAC-1996-HarangsriSN #classification #multi #optimisation #query #using
Query optimisation in multidatabase systems using query classification (BH, JS, AHHN), pp. 173–177.
SACSAC-1996-HashemiSHL #identification #testing #using
Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
SACSAC-1996-HoeltingSW #algorithm #network #search-based #using
Finding investigator tours in telecommunication networks using genetic algorithms (CJH, DAS, RLW), pp. 82–87.
SACSAC-1996-HoeltingSW96a #algorithm #precedence #problem #search-based #using
A genetic algorithm for the minimum broadcast time problem using a global precedence vector (CJH, DAS, RLW), pp. 258–262.
SACSAC-1996-Liu #data type #persistent #runtime #using
A persistent runtime system using persistent data structures (ZL), pp. 429–436.
SACSAC-1996-Turner #generative #named #parsing
SNACC: a parser generator for use with Miranda (DAT), pp. 401–407.
FSEFSE-1996-MedvidovicORT #architecture #design #object-oriented #type system #using
Using Object-Oriented Typing to Support Architectural Design in the C2 Style (NM, PO, JER, RNT), pp. 24–32.
FSEFSE-1996-NaumovichCO #analysis #communication #data flow #protocol #using #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
FSEFSE-1996-SeiterPL #behaviour #evolution #using
Evolution of Object Behavior Using Context Relations (LMS, JP, KJL), pp. 46–57.
ICSEICSE-1996-KoskimiesM #diagrams #named #object-oriented #source code #using
Scene: Using Scenario Diagrams and Active Text for Illustrating Object-Oriented Programs (KK, HM), pp. 366–375.
ICSEICSE-1996-Ledru #tool support #using
Using KIDS as a Tool Support for VDM (YL), pp. 236–245.
ICSEICSE-1996-OgasawaraYK #case study #experience #lifecycle #metric #quality #using
Experiences of Software Quality Management Using Metrics through the Life-Cycle (HO, AY, MK), pp. 179–188.
ICSEICSE-1996-ShepperdSK #estimation #using
Effort Estimation Using Analogy (MJS, CS, BK), pp. 170–178.
ASPLOSASPLOS-1996-JamrozikFVEKLV #latency #memory management #network #using
Reducing Network Latency Using Subpages in a Global Memory Environment (HAJ, MJF, GMV, JEI, ARK, HML, MKV), pp. 258–267.
CCCC-1996-Salomon #maintenance #partial evaluation #reuse #using
Using Partial Evaluation in Support of Portability, Reusability, and Maintainability (DJS), pp. 208–222.
HPCAHPCA-1996-CvetanovicB #performance #specification #using
Performance Characterization of the Alpha 21164 Microprocessor Using TP and SPEC Workloads (ZC, DB), pp. 270–280.
HPCAHPCA-1996-IftodeDFL #automation #memory management #using
Improving Release-Consistent Shared Virtual Memory Using Automatic Update (LI, CD, EWF, KL), pp. 14–25.
HPCAHPCA-1996-KontothanassisS #distributed #interface #memory management #network #performance #using
Using Memory-Mapped Network Interfaces to Improve the Performance of Distributed Shared Memory (LIK, MLS), pp. 166–177.
HPDCHPDC-1996-ChandyRSMRTW #distributed #internet #java #using
A World-Wide Distributed System Using Java and the Internet (KMC, AR, PAGS, JM, MR, WT, LW), pp. 11–18.
HPDCHPDC-1996-Konchady #distributed #using
Distributed Supercomputing Using ACTS (MK), pp. 172–181.
CADECADE-1996-Fuchs #experience #heuristic #proving
Experiments in the Heuristic Use of Past Proof Experience (MF), pp. 523–537.
CAVCAV-1996-Avrunin #algebra #geometry #model checking #using
Symbolic Model Checking Using Algebraic Geometry (GSA), pp. 26–37.
CAVCAV-1996-BengtssonGKLLPY #protocol #using #verification
Verification of an Audio Protocol with Bus Collision Using UPPAAL (JB, WODG, KJK, KGL, FL, PP, WY), pp. 244–256.
CAVCAV-1996-BoigelotG #communication #infinity #protocol #using #verification
Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (Extended Abstract) (BB, PG), pp. 1–12.
CAVCAV-1996-ClarkeGZ #algorithm #proving #theorem proving #using #verification
Verifying the SRT Division Algorithm Using Theorem Proving Techniques (EMC, SMG, XZ), pp. 111–122.
CAVCAV-1996-FernandezJJV #generative #on the fly #testing #using #verification
Using On-The-Fly Verification Techniques for the Generation of test Suites (JCF, CJ, TJ, CV), pp. 348–359.
CAVCAV-1996-GrafS #invariant #proving #theorem proving #using #verification
Verifying Invariants Using theorem Proving (SG, HS), pp. 196–207.
CSLCSL-1996-Matzinger #modelling #using
Computational Representations of Herbrand Models Using Grammars (RM), pp. 334–348.
ISSTAISSTA-1996-BarjaktarovicCJ #functional #kernel #protocol #specification #using #verification
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS (MB, SKC, KJ), pp. 270–279.
ISSTAISSTA-1996-CrowleyLL #automation #formal method #testing
Issues in the Full Scale Use of Formal Methods for Automated Testing (JLC, JFL, KAL), pp. 71–78.
ISSTAISSTA-1996-GodefroidPS #concurrent #industrial #partial order #source code #using #validation
Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs (PG, DP, MGS), pp. 261–269.
ISSTAISSTA-1996-MarreB
Unconstrained Duals and Their Use in Achieving All-Uses Coverage (MM, AB), pp. 147–157.
ISSTAISSTA-1996-MorellM #analysis #testing #using
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
ICLPJICSLP-1996-FordanGN #constraints #optimisation #problem #using
Optimizing Constraint-Intensive Problems Using Early Projection (Poster Abstract) (AF, UG, AN), p. 537.
DACDAC-1995-BiekerM #constraints #generative #logic programming #self #using
Retargetable Self-Test Program Generation Using Constraint Logic Programming (UB, PM), pp. 605–611.
DACDAC-1995-BredenfeldC #design #graph #integration #tool support #using
Tool Integration and Construction Using Generated Graph-Based Design Representations (AB, RC), pp. 94–99.
DACDAC-1995-ChouKW #3d #approach #simulation #using
Transient Simulations of Three-Dimensional Integrated Circuit Interconnect Using a Mixed Surface-Volume Approach (MC, TK, JW), pp. 485–490.
DACDAC-1995-DeCastelo-Vide-e-SouzaPP #algorithm #approach #architecture #optimisation #throughput #using
Optimal ILP-Based Approach for Throughput Optimization Using Simultaneous Algorithm/Architecture Matching and Retiming (YGDVeS, MP, ACP), pp. 113–118.
DACDAC-1995-LiM #analysis #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
DACDAC-1995-LiuKCH #approach #clustering #graph #replication #using
Performance-Driven Partitioning Using a Replication Graph Approach (LTL, MTK, CKC, TCH), pp. 206–210.
DACDAC-1995-LyKMM #behaviour #scheduling #using
Scheduling Using Behavioral Templates (TL, DK, RM, DM), pp. 101–106.
DACDAC-1995-NarayanG #generative #interface #process #protocol #using
Interfacing Incompatible Protocols Using Interface Process Generation (SN, DG), pp. 468–473.
DACDAC-1995-SilvaK #design #using #web
The Case for Design Using the World Wide Web (MJS, RHK), pp. 579–585.
DACDAC-1995-VenkataramanHFRCP #agile #fault #simulation #using
Rapid Diagnostic Fault Simulation of Stuck-at Faults in Sequential Circuits Using Compact Lists (SV, IH, WKF, EMR, SC, JHP), pp. 133–138.
DACDAC-1995-WempleY #analysis #megamodelling #using
Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
DACDAC-1995-ZepterGM #data flow #design #generative #graph #using
Digital Receiver Design Using VHDL Generation from Data Flow Graphs (PZ, TG, HM), pp. 228–233.
ASEKBSE-1995-CliftonL #component #design #using
Classifying Software Components Using Design Characteristics (CC, WSL), pp. 139–146.
ASEKBSE-1995-HoweMM #empirical #sequence #testing #using
Test Sequences as Plans: An Experiment in Using an AI Planner to Generate System Tests (AEH, AvM, RTM), pp. 184–191.
ASEKBSE-1995-PenixBA #classification #component #retrieval #reuse #semantics #using
Classification and Retrieval of Reusable Components Using Semantic Features (JP, PB, PA), pp. 131–138.
ICDARICDAR-v1-1995-AkindeleB #documentation #modelling #using
Construction of generic models of document structures using inference of tree grammars (OTA, AB), pp. 206–209.
ICDARICDAR-v1-1995-ArikiM #recognition #segmentation #using
Segmentation and recognition of handwritten characters using subspace method (YA, YM), pp. 120–123.
ICDARICDAR-v1-1995-BayerW #documentation #using
Experiments on extracting structural information from paper documents using syntactic pattern (TAB, HW), pp. 476–479.
ICDARICDAR-v1-1995-BlandoKN #image #predict #using
Prediction of OCR accuracy using simple image features (LRB, JK, TAN), pp. 319–322.
ICDARICDAR-v1-1995-BunkeL #classification #documentation #parsing #using
Classification and postprocessing of documents using an error-correcting parser (HB, RL), pp. 222–226.
ICDARICDAR-v1-1995-ChiuTC #invariant #matrix #recognition #using
Invariant handwritten Chinese character recognition using weighted ring-data matrix (HPC, DCT, JCC), pp. 116–119.
ICDARICDAR-v1-1995-FangH #algorithm #approach #recognition #testing #using #word
A hypothesis testing approach to word recognition using an A* search algorithm (CF, JJH), pp. 360–363.
ICDARICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition #using
Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
ICDARICDAR-v1-1995-Gentric #metric #recognition #using #word
Experimental results on improved handwritten word recognition using the Levenshtein metric (PG), pp. 364–367.
ICDARICDAR-v1-1995-GrbavecB #graph grammar #recognition #using
Mathematics recognition using graph rewriting (AG, DB), pp. 417–421.
ICDARICDAR-v1-1995-GuyonP #design #markov #memory management #modelling #using
Design of a linguistic postprocessor using variable memory length Markov models (IG, FP), pp. 454–457.
ICDARICDAR-v1-1995-HochbergKKT #automation #clustering #identification #image #using
Automatic script identification from images using cluster-based templates (JH, LK, PK, TT), pp. 378–381.
ICDARICDAR-v1-1995-HongH #visual notation
Visual inter-word relations and their use in OCR postprocessing (TH, JJH), pp. 442–445.
ICDARICDAR-v1-1995-HongLHS #classification #design #nearest neighbour #recognition
The design of a nearest-neighbor classifier and its use for Japanese character recognition (TH, SWKL, JJH, SNS), pp. 270–273.
ICDARICDAR-v1-1995-KaneharaSH #flexibility #image #retrieval #using #visual notation
A flexible image retrieval using explicit visual instruction (FK, SS, TH), pp. 175–178.
ICDARICDAR-v1-1995-Kawatani #performance #recognition #using
Character recognition performance improvement using personal handwriting characteristics (TK), pp. 98–103.
ICDARICDAR-v1-1995-KimD #classification #distance #network #recognition #using
Off-line Recognition of Korean Scripts Using Distance Matching and Neural Network Classifiers (SHK, JID), pp. 34–37.
ICDARICDAR-v1-1995-LeeK #multi #network #recognition #self #using
Multi-lingual, multi-font and multi-size large-set character recognition using self-organizing neural network (SWL, JSK), pp. 28–33.
ICDARICDAR-v1-1995-LeTW #analysis #documentation #image #using
Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
ICDARICDAR-v1-1995-LinLS #comprehension #documentation #heuristic #interactive #using
Interactive acquisition of thematic information of Chinese verbs for judicial verdict document understanding using templates, syntactic clues, and heuristics (KHCL, RLL, VWS), pp. 297–300.
ICDARICDAR-v1-1995-OlivierPAL #modelling #probability #recognition #using #word
Recognition of handwritten words using stochastic models (CO, TP, MA, YL), pp. 19–23.
ICDARICDAR-v1-1995-TanahashiSY #algorithm #image #search-based #using
Recovering decorative patterns of ceramic objects from a monocular image using a genetic algorithm (HT, KS, KY), pp. 339–342.
ICDARICDAR-v2-1995-AntonacopoulosR #classification #representation #using
Representation and classification of complex-shaped printed regions using white tiles (AA, RTR), pp. 1132–1135.
ICDARICDAR-v2-1995-AzoklyI #documentation #layout #segmentation
A language for document generic layout description and its use for segmentation into regions (AA, RI), pp. 1123–1126.
ICDARICDAR-v2-1995-CaesarGM95a #recognition #using #word
Using lexical knowledge for the recognition of poorly written words (TC, JMG, EM), pp. 915–918.
ICDARICDAR-v2-1995-ChenHP #documentation #image #recursion #segmentation #using #word
Simultaneous word segmentation from document images using recursive morphological closing transform (SSC, RMH, ITP), pp. 761–764.
ICDARICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #using #verification
Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
ICDARICDAR-v2-1995-FutrelleN #analysis #constraints #diagrams #parsing #performance #using
Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
ICDARICDAR-v2-1995-HaHP #bound #component #recursion #using
Recursive X-Y cut using bounding boxes of connected components (JH, RMH, ITP), pp. 952–955.
ICDARICDAR-v2-1995-HamamotoUMT #recognition #using
Recognition of handprinted Chinese characters using Gabor features (YH, SU, KM, ST), pp. 819–823.
ICDARICDAR-v2-1995-Hirayama #analysis #using
A method for table structure analysis using DP matching (YH), pp. 583–586.
ICDARICDAR-v2-1995-JunKKKK #modelling #online #recognition #using
On-line cursive Korean character recognition by using curvature models (BHJ, MYK, CSK, WSK, JK), pp. 1051–1054.
ICDARICDAR-v2-1995-KanungoHB #distance #documentation #validation
Power functions and their use in selecting distance functions for document degradation model validation (TK, RMH, HSB), pp. 734–739.
ICDARICDAR-v2-1995-KimuraMS #algorithm #recognition #using #word
Handwritten ZIP code recognition using lexicon free word recognition algorithm (FK, YM, MS), pp. 906–910.
ICDARICDAR-v2-1995-LeeLK #online #recognition #using
On-line cursive script recognition using an island-driven search technique (SHL, HL, JHK), pp. 886–889.
ICDARICDAR-v2-1995-LiangAS #approach #segmentation #using
Segmentation of interference marks using morphological approach (SL, MA, MS), pp. 1042–1046.
ICDARICDAR-v2-1995-MiyaoN #approach #music #network #using
Head and stem extraction from printed music scores using a neural network approach (HM, YN), pp. 1074–1079.
ICDARICDAR-v2-1995-NakamuraHN #image #using
Drawing capturing system using image enhancement (NN, KH, MN), pp. 652–655.
ICDARICDAR-v2-1995-OhK #markov #modelling #recognition #using
Off-line recognition of handwritten Korean and alphanumeric characters using hidden Markov models (CO, WSK), pp. 815–818.
ICDARICDAR-v2-1995-ParmentierB #architecture #bibliography #using #validation
Bibliography references validation using emergent architecture (FP, AB), pp. 532–535.
ICDARICDAR-v2-1995-SafariNSA #documentation #geometry #using
Document registration using projective geometry (RS, NN, MS, MA), pp. 1161–1164.
ICDARICDAR-v2-1995-SauvolaP #analysis #classification #feature model #performance #segmentation #using
Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
ICDARICDAR-v2-1995-ShikuNATK #using
Extraction of slant character candidates from maps using circular templates (OS, AN, MA, HT, HK), pp. 936–939.
ICDARICDAR-v2-1995-SivaramakrishnanPHSH #classification #documentation #generative #using
Zone classification in a document using the method of feature vector generation (RS, ITP, JH, SS, RMH), pp. 541–544.
ICDARICDAR-v2-1995-TangMXCS #documentation #using
Extraction of reference lines from documents with grey-level background using sub-images of wavelets (YYT, HM, DX, YC, CYS), pp. 571–574.
ICDARICDAR-v2-1995-Ueda #using
Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
ICDARICDAR-v2-1995-YoonLK #image #using
Faxed image restoration using Kalman filtering (MYY, SWL, JSK), pp. 677–680.
ICDARICDAR-v2-1995-ZiinoAS #machine learning #recognition #using
Recognition of hand printed Latin characters using machine learning (DZ, AA, CS), pp. 1098–1102.
PODSPODS-1995-ChangH #database #generative #using
Using Witness Generators to Support Bi-directional Update Between Object-Based Databases (TPC, RH), pp. 196–207.
PODSPODS-1995-LevyMSS #query #using
Answering Queries Using Views (AYL, AOM, YS, DS), pp. 95–104.
PODSPODS-1995-RajaramanSU #query #using
Answering Queries Using Templates with Binding Patterns (AR, YS, JDU), pp. 105–112.
SIGMODSIGMOD-1995-AdyaGLM #concurrent #performance #using
Efficient Optimistic Concurrency Control Using Loosely Synchronized Clocks (AA, RG, BL, UM), pp. 23–34.
SIGMODSIGMOD-1995-Atkinson #architecture #component #relational
Use of a Component Architecture in Integrating Relational and Non-relational Storage Systems (RGA), p. 454.
SIGMODSIGMOD-1995-DreyerDS #using
Using the CALANDA Time Series Management System (WD, AKD, DS), p. 489.
VLDBVLDB-1995-AmmannJR #formal method #semantics #transaction #using
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
VLDBVLDB-1995-BelussiF #correlation #query #using
Estimating the Selectivity of Spatial Queries Using the “Correlation” Fractal Dimension (AB, CF), pp. 299–310.
VLDBVLDB-1995-SistlaYLL #retrieval #similarity #using
Similarity based Retrieval of Pictures Using Indices on Spatial Relationships (APS, CTY, CL, KLL), pp. 619–629.
CSEETCSEE-1995-CoyneDGR #approach #case study #education #experience #modelling #re-engineering
Teaching More Comprehensive Model-Based Software Engineering: Experience with Objectory’s Use Case Approach (RFC, AHD, BB, DR), pp. 339–374.
CSEETCSEE-1995-Hefley #comprehension #design #education #using #web
Understanding, Using and Designing for Educational Uses of the World-Wide Web (WEH), pp. 431–432.
TFPIEFPLE-1995-HilsdaleADF #compilation #using
Compiler Construction Using Scheme (EH, JMA, RKD, DPF), pp. 251–267.
TFPIEFPLE-1995-KlugeRS #education #execution #functional #programming #using
Using pi-RED as a Teaching Tool for Functional Programming and Program Execution (WEK, CR, SBS), pp. 231–249.
ICSMEICSM-1995-AvrilionisC #maintenance #modelling #petri net #process #using
Using views to maintain Petri-net-based process models (DA, PYC), pp. 318–326.
ICSMEICSM-1995-CimitileLM #case study #identification #reuse #slicing #specification #using
Identifying reusable functions using specification driven program slicing: a case study (AC, ADL, MM), pp. 124–133.
ICSMEICSM-1995-DeBaudR #domain model #modelling #re-engineering #using
A software re-engineering method using domain models (JMD, SR), pp. 204–213.
ICSMEICSM-1995-StoreyM #using
Manipulating and documenting software structures using SHriMP views (MADS, HAM), p. 275–?.
ICSMEICSM-1995-Williams #analysis #case study #design #experience #object-oriented #using
Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
WCREWCRE-1995-CimitileLM #execution #reuse #symbolic computation #using
Qualifying Reusable Functions Using Symbolic Execution (AC, ADL, MM).
WCREWCRE-1995-EdwardsM #logic #using
Deriving a Logical Data Model for a System Using the RECAST Method (HME, MM).
PEPMPEPM-1995-Cridlig #analysis #concurrent #model checking #semantics #using
Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
PEPMPEPM-1995-Monsuez #abstract interpretation #strict #type inference #using
Using Abstract Interpretation to Define a Strictness Type Inference System (BM), pp. 122–133.
PLDIPLDI-1995-BarrettZ #bound #garbage collection #using
Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
PLDIPLDI-1995-BurgerWD #lazy evaluation #using
Register Allocation Using Lazy Saves, Eager Restores, and Greedy Shuffling (RGB, OW, RKD), pp. 130–138.
PLDIPLDI-1995-ColemanM #layout #using
Tile Size Selection Using Cache Organization and Data Layout (SC, KSM), pp. 279–290.
SASSAS-1995-Faxen #functional #lazy evaluation #optimisation #source code #using
Optimizing Lazy Functional Programs Using Flow Inference (KFF), pp. 136–153.
SASSAS-1995-Giesl #analysis #functional #order #source code #termination #using
Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
SASSAS-1995-Schmidt-SchausPS #calculus #reduction #using
Abstract Reduction Using a Tableau Calculus (MSS, SEP, MS), pp. 348–365.
ICALPICALP-1995-FennerLM #sequence
Weakly Useful Sequences (SAF, JHL, EM), pp. 393–404.
ICALPICALP-1995-ParraS #graph #how
How to Use the Minimal Separators of a Graph for its Chordal Triangulation (AP, PS), pp. 123–134.
FPCAFPCA-1995-SharpR #specification #using
Using a Language of Functions and Relations for VLSI Specification (RS, OR), pp. 45–54.
CHICHI-1995-HillSRF #community #recommendation
Recommending and Evaluating Choices in a Virtual Community of Use (WCH, LS, MR, GWF), pp. 194–201.
CHICHI-1995-JohnP #approach #case study #learning #using
Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
CHICHI-1995-KabbashB #using
The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
CHICHI-1995-KierasWM #architecture #modelling #predict #using
Predictive Engineering Models Using the EPIC Architecture for a High-Performance Task (DEK, SDW, DEM), pp. 11–18.
CHICHI-1995-MalinowskiN #collaboration #design #user interface #using
Using Computational Critics to Facilitate Long-Term Collaboration in User Interface Design (UM, KN), pp. 385–392.
CHICHI-1995-MitchellPB #learning #using
Learning to Write Together Using Groupware (AM, IP, RB), pp. 288–295.
CHICHI-1995-OlsonOM #design #question #realtime #video #what
What Mix of Video and Audio is Useful for Small Groups Doing Remote Real-Time Design Work? (JSO, GMO, DKM), pp. 362–368.
CHICHI-1995-ShipmanMM #using
Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information (FMSI, CCM, TPM), pp. 346–353.
AdaEuropeAdaEurope-1995-BirusKKRT #ada #realtime
Extending the Ada 95 Initial Conditions for Preelaboration for Use in Real-Time Systems (TB, PK, EK, JR, JLT), pp. 164–169.
AdaEuropeAdaEurope-1995-DaviesR #ada
The Use of Ada for the ENVISAT-1 Simulator (BD, DAR), pp. 170–177.
AdaEuropeAdaEurope-1995-Heitz #ada #automation #c++ #code generation #reliability #reuse #using
Achieving Reusable and Reliable Client-Server Code using HOODTM Automated Code Generation for ADA95 and C++ Targets (MH), pp. 419–438.
AdaEuropeAdaEurope-1995-Molenmaker
Objects at Use in Nautical Simulators (KM), pp. 178–186.
AdaTRI-Ada-1995-BalfourG #ada #paradigm #using
Patterns and paradigms for using Ada 95 (BB, MG), pp. 243–310.
AdaTRI-Ada-1995-Ogren95a #case study #development #experience
Experiences from Trial Use of MIL-STD-498 in Connection with the O4S (Objects for Systems) Development Method (), pp. 773–789.
CAiSECAiSE-1995-DuffyMMM #analysis #automation #framework #reasoning #requirements #using
A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
CAiSECAiSE-1995-ShklarSKS #automation #metadata #named #retrieval
InfoHarness: Use of Automatically Generated Metadata for Search and Retrieval of Heterogeneous Information (LAS, APS, VK, KS), pp. 217–230.
CAiSECAiSE-1995-SiauWB #concept
A Psychological Study on the Use of Relationship Concept — Some Preliminary Findings (KS, YW, IB), pp. 341–354.
CIKMCIKM-1995-Bestavros #using
Using Speculation to Reduce Server Load and Service Time on the WWW (AB), pp. 403–410.
CIKMCIKM-1995-IkejiF #adaptation #query #using
Computation of Partial Query Results Using An Adaptive Stratified Sampling Technique (ACI, FF), pp. 145–149.
CIKMCIKM-1995-Paradis #topic #using
Using Linguistic and Discourse Structures to Derive Topics (FP), pp. 44–49.
CIKMCIKM-1995-ParkHC #automation #network #using
Automatic Thesaurus Construction Using Bayesian Networks (YCP, YSH, KSC), pp. 212–217.
CIKMCIKM-1995-ShrufiT #knowledge base #query #using
Query Processing for Knowledge Bases Using Join Indices (AS, TT), pp. 158–166.
CIKMCIKM-1995-Tammet #using
Using Resolution for Extending KL-ONE-type Languages (TT), pp. 326–332.
CIKMCIKM-1995-YoonSP #approach #database #deduction #object-oriented #query #semantics #using
Semantic Query Processing in Object-Oriented Databases Using Deductive Approach (SCY, IYS, EKP), pp. 150–157.
ICMLICML-1995-AbeLN #2d #algorithm #learning #online #using
On-line Learning of Binary Lexical Relations Using Two-dimensional Weighted Majority Algorithms (NA, HL, AN), pp. 3–11.
ICMLICML-1995-ClearyT #distance #using
K*: An Instance-based Learner Using and Entropic Distance Measure (JGC, LET), pp. 108–114.
ICMLICML-1995-Lubinsky #classification #consistency #performance #using
Increasing the Performance and Consistency of Classification Trees by Using the Accuracy Criterion at the Leaves (DJL), pp. 371–377.
ICMLICML-1995-PerezR #multi #using
Using Multidimensional Projection to Find Relations (EP, LAR), pp. 447–455.
ICMLICML-1995-SalganicoffU #learning #multi #using
Active Exploration and Learning in real-Valued Spaces using Multi-Armed Bandit Allocation Indices (MS, LHU), pp. 480–487.
ICMLICML-1995-SmythGF #classification #estimation #kernel #using
Retrofitting Decision Tree Classifiers Using Kernel Density Estimation (PS, AGG, UMF), pp. 506–514.
KDDKDD-1995-EzawaN #information management #modelling #network #using
Knowledge Discovery in Telecommunication Services Data Using Bayesian Network Models (KJE, SWN), pp. 100–105.
KDDKDD-1995-KohaviS #set #using
Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology (RK, DS), pp. 192–197.
KDDKDD-1995-ShanZHC #information management #set #tool support #using
Using Rough Sets as Tools for Knowledge Discovery (NS, WZ, HJH, NC), pp. 263–268.
KDDKDD-1995-SimoudisLK #using
Using Recon for Data Cleaning (ES, BL, RK), pp. 282–287.
SEKESEKE-1995-BrownseyZ #functional #programming #specification #user interface #using
From Specification to Building a GUI using Functional Programming (KB, MZ), pp. 244–251.
SEKESEKE-1995-ConstantinidisZ #concept #database #design #using
Engineering an Ingres Active Database using Conceptual Design Knowledge Elements (VC, ABZ), pp. 158–160.
SEKESEKE-1995-FarCK #design #reuse #specification #using
Software Creation: Using Specification and Description Language (SDL) for Capturing and Reusing Human Experts’ Knowledge in Software Design (BHF, HC, ZK), pp. 189–196.
SEKESEKE-1995-GatesC #constraints #re-engineering
The Use of Integrity Constraints in Software Engineering (AQG, DEC), pp. 383–390.
SEKESEKE-1995-PanY #database #named #object-oriented #query
EQL: A Learn-Easy and Use-Easy Query Language for Object-Oriented Databases (WWP, WPY), pp. 366–373.
SIGIRSIGIR-1995-ChakravarthyH #internet #named #semantics #using
Netserf: Using Semantic Knowledge to Find Internet Information Archives (ASC, KBH), pp. 4–11.
SIGIRSIGIR-1995-DeFazioDSSCC #information retrieval #using
Integrating IR and RDBMS Using Cooperative Indexing (SD, AMD, LAS, JS, WBC, JPC), pp. 84–92.
SIGIRSIGIR-1995-EfraimidisGMST #parallel #performance #retrieval #using
Parallel Text Retrieval on a High Performance Super Computer Using the Vector Space Model (PSE, CG, BM, PGS, BT), pp. 58–66.
SIGIRSIGIR-1995-OgawaI #documentation #using
A New Character-based Indexing Organization using Frequency Data for Japanese Documents (YO, MI), pp. 121–129.
SIGIRSIGIR-1995-PfeiferF #approach #data type #performance #query #using
Efficient Processing of Vague Queries using a Data Stream Approach (UP, NF), pp. 189–197.
ECOOPECOOP-1995-DeanGC #analysis #object-oriented #optimisation #source code #using
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
ECOOPECOOP-1995-LeaM #interface #protocol #specification #using
Interface-Based Protocol Specification of Open Systems using PSL (DL, JM), pp. 374–398.
ECOOPECOOP-1995-SchmidtS #communication #design pattern #experience #using
Experience Using Design Patterns to Evolve Communication Software Across Diverse OS Platforms (DCS, PS), pp. 399–423.
ECOOPECOOP-1995-SeligmannG #algorithm #garbage collection #incremental #maturity #using
Incremental Mature Garbage Collection Using the Train Algorithm (JS, SG), pp. 235–252.
ECOOPECOOP-1995-StroudW #data type #protocol #using
Using Metaobject Protocols to Implement Atomic Data Types (RJS, ZW), pp. 168–189.
OOPSLAOOPSLA-1995-ItohYT #concurrent #low level #named #operating system #programming #using
SCONE: Using Concurrent Objects for Low-level Operating System Programming (JiI, YY, MT), pp. 385–398.
OOPSLAOOPSLA-1995-MasuharaMAY #compilation #concurrent #object-oriented #partial evaluation #using
Compiling Away the Meta-Level in Object-Oriented Concurrent Reflective Languages Using Partial Evaluation (HM, SM, KA, AY), pp. 300–315.
OOPSLAOOPSLA-1995-Smith #experience #prototype #user interface #using
Using a Prototype-based Language for User Interface: The Newton Project’s Experience (WRS), pp. 61–72.
LOPSTRLOPSTR-1995-ArtsZ #logic programming #semantics #source code #termination #unification #using
Termination of Logic Programs Using Semantic Unification (TA, HZ), pp. 219–233.
LOPSTRLOPSTR-1995-VasconcelosF #approach #logic programming #optimisation #program analysis #using
An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
LOPSTRLOPSTR-1995-WaalT #deduction #problem #program analysis #program transformation #using
Solving Deductive Planning Problems Using Program Analysis and Transformation (DAdW, MT), pp. 189–203.
PPDPPLILP-1995-SaglamG #approximate #constraints #logic programming #polymorphism #source code #using
Approximating Constraint Logic Programs Using Polymorphic Types and Regular Descriptions (HS, JPG), pp. 461–462.
POPLPOPL-1995-FlanaganF #optimisation #semantics
The Semantics of Future and Its Use in Program Optimizations (CF, MF), pp. 209–220.
POPLPOPL-1995-HarperM #analysis #compilation #morphism #polymorphism #using
Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
POPLPOPL-1995-Reynolds #category theory #using
Using Functor Categories to Generate Intermediate Code (JCR), pp. 25–36.
RERE-1995-ChungNY #non-functional #requirements #using
Using non-functional requirements to systematically support change (LC, BAN, ESKY), pp. 132–139.
RERE-1995-RegnellKW #approach #case study #requirements
Improving the use case driven approach to requirements engineering (BR, KK, AW), pp. 40–41.
SACSAC-1995-AbualiWS95a #algorithm #morphism #problem #search-based #using
Solving the three-star tree isomorphism problem using genetic algorithms (FNA, RLW, DAS), pp. 337–344.
SACSAC-1995-Arnow #email #network #programming #using
:-) When you grade that: using e-mail and the network in programming courses (DMA), pp. 10–13.
SACSAC-1995-BowmanD #distributed #modelling #using
Modelling distributed systems using Z (HB, JD), pp. 147–151.
SACSAC-1995-CrawfordVW #algorithm #detection #multi #search-based #using
Detecting multiple outliers in regression data using genetic algorithms (KDC, DJV, RLW), pp. 351–356.
SACSAC-1995-Duben #modelling #statistics #using
Conformational statistics of models for serine- and threonine-linked glycopeptides using umbrella sampling (AJD), pp. 108–112.
SACSAC-1995-FiedlerLDL #using
Optimal initialization of mixed-layer model using the adjoint technique (RF, SL, SKD, JML), pp. 91–95.
SACSAC-1995-GrimRP #3d #algorithm #re-engineering #search-based
Use of genetic algorithms in three-dimensional reconstruction in carbon black aggregates (RJG, JRR, LDP), pp. 288–292.
SACSAC-1995-GudaitisLT #parallel #using
Multicriteria vehicle route-planning using parallel A* search (MSG, GBL, AJT), pp. 171–176.
SACSAC-1995-KaedingF #multi #paradigm
Processing unexact information in a medical used multiparadigm system (AKK, TF), pp. 590–592.
SACSAC-1995-KrishnaKumarS #algorithm #fuzzy #modelling #multi #using
Discovering multiple fuzzy models using the EFMCN algorithm (KK, AS), pp. 537–541.
SACSAC-1995-KumblaJB #algorithm #fuzzy #implementation #logic #network #using
Implementation of fuzzy logic and neural networks control algorithm using a digital signal processing chip (KKK, MJ, JBR), pp. 524–528.
SACSAC-1995-LiangL #algorithm #matrix #representation #scheduling #search-based #using
A sparse matrix representation for production scheduling using genetic algorithms (SJTL, JML), pp. 313–317.
SACSAC-1995-Sabin #generative #linear #parallel
The use of parallelization in the generation of binary linear codes (RES), pp. 215–220.
SACSAC-1995-SmitsBSD #approach #fuzzy #image #using
An image processing approach using fuzzy topology (PCS, DdB, AS, SGD), pp. 557–561.
SACSAC-1995-Spector #development #problem #using
Using system dynamics to model courseware development: the project dynamics of complex problem-solving (JMS), pp. 32–35.
SACSAC-1995-Stegmaier-StraccaT #classification #detection #fuzzy #using
Cough detection using fuzzy classification (PASS, NNTG), pp. 440–444.
SACSAC-1995-Tschichold-Gurman #classification #fuzzy #generative #incremental #learning #using
Generation and improvement of fuzzy classifiers with incremental learning using fuzzy RuleNet (NNTG), pp. 466–470.
ESECESEC-1995-TuyaSC #model checking #modelling #safety #using #verification
Using a Symbolic Model Checker for Verify Safety Properties in SA/RT Models (JT, LS, JAC), pp. 59–75.
ESECESEC-1995-VottaZ #case study #design #process #using
Design Process Improvement Case Study Using Process Waiver Data (LGV, MLZ), pp. 44–58.
FSEFSE-1995-GuptaS #approach #hybrid #information management #slicing #using
Hybrid Slicing: An Approach for Refining Static Slices Using Dynamic Information (RG, MLS), pp. 29–40.
FSEFSE-1995-Weyuker #assessment #reliability #testing #using
Using the Consequence of Failures for Testing and Reliability Assessment (EJW), pp. 81–91.
ICSEICSE-1995-BarghoutiK #constraints #monitoring #process #using
Using Event Contexts and Matching Constraints to Monitor Software Processes (NSB, BK), pp. 83–92.
ICSEICSE-1995-BertolinoS #assessment #dependence #metric #testing #using
Using Testability Measures for Dependability Assessment (AB, LS), pp. 61–70.
ICSEICSE-1995-Floch #automation #code generation #evolution #flexibility #maintenance #using
Supporting Evolution and Maintenance by Using a Flexible Automatic Code Generator (JF), pp. 211–219.
ASF+SDFASF+SDF-1995-BrandEGMOP #asf+sdf #program transformation #using
Program Transformations using ASF+SDF (MvdB, SME, DKAG, HM, MJFP, HRO), pp. 29–52.
ASF+SDFASF+SDF-1995-Vigna #asf+sdf #case study #specification #using
Specifying Imp(G) Using ASF+SDF: A Case Study (SV), pp. 65–88.
HPCAHPCA-1995-CitronR #using
Creating a Wider Bus Using Caching Techniques (DC, LR), pp. 90–99.
HPCAHPCA-1995-FarkasJC #execution #how #multi #question
How Useful Are Non-Blocking Loads, Stream Buffers and Speculative Execution in Multiple Issue Processors? (KIF, NPJ, PC), pp. 78–89.
HPDCHPDC-1995-AbramsonSGH #distributed #named #simulation #using
Nimrod: A Tool for Performing Parameterised Simulations Using Distributed Workstations (DA, RS, JG, BH), pp. 112–121.
LCTESLCT-RTS-1995-LiM #analysis #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
SOSPSOSP-1995-FordHL #interface #using
Using Annotated Interface Definitions to Optimize RPC (BF, MH, JL), p. 232.
SOSPSOSP-1995-GhemawatKL #database #object-oriented #performance #using
Using a Modified Object Buffer to Improve the Write Performance of an Object-Oriented Database (SG, MFK, BL), p. 235.
CAVCAV-1995-AndersenV #behaviour #fixpoint #performance #using
Efficient Checking of Behavioural Relations and Modal Assertions using Fixed-Point Inversion (HRA, BV), pp. 142–154.
CAVCAV-1995-BasinK #hardware #higher-order #logic #monad #using #verification
Hardware Verification using Monadic Second-Order Logic (DAB, NK), pp. 31–41.
CAVCAV-1995-DingelF #abstraction #infinity #model checking #proving #reasoning #theorem proving #using
Model Checking for Infinite State Systems Using Data Abstraction, Assumption-Commitment Style reasoning and Theorem Proving (JD, TF), pp. 54–69.
CAVCAV-1995-EirikssonM #analysis #case study #design #using #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
CAVCAV-1995-McMillan #using #verification
Trace Theoretic Verification of Asynchronous Circuits Using Unfoldings (KLM), pp. 180–195.
ICLPICLP-1995-BarbutiFS #execution #modelling #prolog #using
Modeling OR-Parallel Execution of Prolog using CHOCS (RB, NDF, AS), pp. 547–561.
ICLPICLP-1995-ChiuL #constraints #linear #theorem proving #using
Interval Linear Constraint Solving Using the Preconditioned Interval Gauss-Seidel Method (CKC, JHML), pp. 17–31.
ICLPICLP-1995-HermenegildoGC #concurrent #implementation #logic programming #parallel #using
Using Attributed Variables in the Implementation of Concurrent and Parallel Logic Programming Systems (MVH, DCG, MC), pp. 631–645.
ICLPICLP-1995-Jain #logic programming #source code #using
Projections of Logic Programs using Symbol Mappings (AJ), pp. 483–496.
RTARTA-1995-KirchnerM #constraints #prototype #using
Prototyping Completion with Constraints Using Computational Systems (HK, PEM), pp. 438–443.
TLCATLCA-1995-BerardiB #optimisation #type system #using
Using Subtyping in Program Optimization (SB, LB), pp. 63–77.
DACDAC-1994-BaldwinC #design #graph grammar #using
Design Methodology Management Using Graph Grammars (RAB, MJC), pp. 472–478.
DACDAC-1994-BeattyB #simulation #using #verification
Formally Verifying a Microprocessor Using a Simulation Methodology (DLB, REB), pp. 596–602.
DACDAC-1994-ChenF #analysis #using
Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
DACDAC-1994-GuptaCDP #design #experience #image #tool support #using
Experience with Image Compression Chip Design using Unified System Construction Tools (PG, CTC, JCDB, ACP), pp. 250–256.
DACDAC-1994-ImanPC #fuzzy #logic #using
Technology Mapping Using Fuzzy Logic (SI, MP, KC), pp. 333–338.
DACDAC-1994-KahngM #analysis #equation #using
Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
DACDAC-1994-KeeSGK #framework
The Use of CAD Frameworks in a CIM Environment (WTK, DS, JG, LKK), pp. 257–261.
DACDAC-1994-Minato #algebra #set #using
Calculation of Unate Cube Set Algebra Using Zero-Suppressed BDDs (SiM), pp. 420–424.
DACDAC-1994-MurgaiBS #composition #encoding #functional #using
Optimum Functional Decomposition Using Encoding (RM, RKB, ALSV), pp. 408–414.
DACDAC-1994-NagumoNNMM #fault #named #reduction #using
VFSIM: Vectorized Fault Simulator Using a Reduction Technique Excluding Temporarily Unobservable Faults (TN, MN, TN, MM, SM), pp. 510–515.
DACDAC-1994-PomeranzR #combinator #fault #scalability #using
Design-for-Testability for Path Delay Faults in Large Combinatorial Circuits Using Test-Points (IP, SMR), pp. 358–364.
DACDAC-1994-PotkonjakD #optimisation #resource management #testing #using
Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
DACDAC-1994-PotkonjakSC #constant #multi #performance #using
Efficient Substitution of Multiple Constant Multiplications by Shifts and Additions Using Iterative Pairwise Matching (MP, MBS, AC), pp. 189–194.
DACDAC-1994-RiessDJ #clustering #scalability #using
Partitioning Very Large Circuits Using Analytical Placement Techniques (BMR, KD, FMJ), pp. 646–651.
DACDAC-1994-SaldanhaHMBS #optimisation #performance #using
Performance Optimization Using Exact Sensitization (AS, HH, PCM, RKB, ALSV), pp. 425–429.
DACDAC-1994-ShipleHSB #heuristic #using
Heuristic Minimization of BDDs Using Don’t Cares (TRS, RH, ALSV, RKB), pp. 225–231.
DACDAC-1994-SilveiraEWCK #approach #performance #simulation #using
An Efficient Approach to Transmission Line Simulation Using Measured or Tabulated S-parameter Data (LMS, IME, JW, MC, KSK), pp. 634–639.
DACDAC-1994-TsaiM #using
Boolean Matching Using Generalized Reed-Muller Forms (CCT, MMS), pp. 339–344.
DACDAC-1994-VittalM #design #using
Minimal Delay Interconnect Design Using Alphabetic Trees (AV, MMS), pp. 392–396.
DATEEDAC-1994-AhmedCC #approach #fault #modelling #optimisation #using
A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
DATEEDAC-1994-BaharCHMS #analysis #using
Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
DATEEDAC-1994-BrashearMOPM #analysis #performance #predict #statistics #using
Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
DATEEDAC-1994-ByrneMLD #bibliography #optimisation #using
An Overview of Analogue Optimisation Using “AD-OPT” (EB, OM, DL, BD), pp. 540–545.
DATEEDAC-1994-DalkilicP #bound #scheduling #using
Optimal Operation Scheduling Using Resource Lower Bound Estimations (MED, VP), pp. 319–324.
DATEEDAC-1994-HuangR #behaviour #performance #throughput #using
Maximizing the Throughput of High Performance DSP Applications Using Behavioral Transformations (SHH, JMR), pp. 25–30.
DATEEDAC-1994-NaganumaOH #algorithm #debugging #design #using #validation
High-Level Design Validation Using Algorithmic Debugging (JN, TO, TH), pp. 474–480.
DATEEDAC-1994-WangD #approximate #linear #optimisation #performance #using
An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
ASEKBSE-1994-MintonW #machine learning #source code #using
Using Machine Learning to Synthesize Search Programs (SM, SRW), pp. 31–38.
ASEKBSE-1994-WildR #evolution #reuse #specification #using
Evolution and Reuse of Formal Specification Using Decision Structures (JCW, DR), pp. 108–115.
HTHT-ECHT-1994-Brailsford #experience
Experience with the Use of Acrobat in the CAJUN Publishing Project (DFB), pp. 228–232.
HTHT-ECHT-1994-ChristophidesR #documentation #hypermedia #query #using
Querying Structured Documents with Hypertext Links using OODBMS (VC, AR), pp. 186–197.
PODSPODS-1994-FaloutsosK #analysis #concept #independence #using
Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
SIGMODSIGMOD-1994-ChenR #adaptation #estimation #feedback #query #using
Adaptive Selectivity Estimation Using Query Feedback (CMC, NR), pp. 161–172.
SIGMODSIGMOD-1994-LoR #using
Spatial Joins Using Seeded Trees (MLL, CVR), pp. 209–220.
VLDBVLDB-1994-Galindo-LegariaPK #performance #question #random #why
Fast, Randomized Join-Order Selection — Why Use Transformations? (CAGL, AP, MLK), pp. 85–95.
VLDBVLDB-1994-KamelF #using
Hilbert R-tree: An Improved R-tree using Fractals (IK, CF), pp. 500–509.
VLDBVLDB-1994-Lesk #how #image #library
Experiments on Access to Digital Libraries: How can Images and Text be Used Together (ML), pp. 655–667.
VLDBVLDB-1994-LiC #database #integration #network #semantics #semistructured data #using
Semantic Integration in Heterogeneous Databases Using Neural Networks (WSL, CC), pp. 1–12.
CSEETCSEE-1994-BralickR #distance #education #multi #re-engineering #using
Using a Multi-User Dialogue System to Support Software Engineering Distance Education (WABJ, JSR), pp. 565–582.
CSEETCSEE-1994-Epstein #education #re-engineering
The Use of Computer Ethics Scenarios in Software Engineering Education: The Case of the Killer Robot (RGE), pp. 429–440.
CSEETCSEE-1994-Horton #automation #design #education #using
Using Commercial CASE Environments to Teach Software Design (TBH), pp. 97–115.
CSEETCSEE-1994-Zalewski #tool support
Cohesive Use of Commercial Tools in a Classroom (JZ), pp. 65–75.
ICSMEICSM-1994-AshAOL #health #maintenance #modelling #using
Using Software Maintainability Models to Track Code Health (DA, JA, PWO, BL), pp. 154–160.
ICSMEICSM-1994-CowanGLS #comprehension #readability #using
Enhancing Code for Readability and Comprehension Using SGML (DDC, DMG, CJPdL, AvS), pp. 181–190.
ICSMEICSM-1994-KinlochM #c #comprehension #graph #representation #source code #using
Understanding C Programs Using the Combined C Graph Representation (DAK, MM), pp. 172–180.
ICSMEICSM-1994-PaulP #algebra #query #source code #using
Querying Source Code Using an Algebraic Query Language (SP, AP), pp. 127–136.
PEPMPEPM-1994-CourtenageC #type inference #λ-calculus
Analysing Resource Use in the λ Calculus by Type Inference (SC, CDC), pp. 33–41.
PLDIPLDI-1994-GranlundM #integer #invariant #multi #using
Division by Invariant Integers using Multiplication (TG, PLM), pp. 61–72.
PLDIPLDI-1994-HentenryckCC #analysis #graph #prolog #using
Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
PLDIPLDI-1994-SabryF #analysis #continuation #data flow #question
Is Continuation-Passing Useful for Data Flow Analysis? (AS, MF), pp. 1–12.
PLDIPLDI-1994-Wismuller #analysis #data flow #debugging #source code #using
Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
SASSAS-1994-CodishD #dependence #logic programming #multi #polymorphism #source code #using
Deriving Polymorphic Type Dependencies for Logic Programs Using Multiple Incarnations of Prop (MC, BD), pp. 281–296.
SASSAS-1994-GrasH #independence #strict #using
Extracting Non-Strict Independent And-Parallelism Using Sharing and Freeness Information (DCG, MVH), pp. 297–313.
SASSAS-1994-Jorgensen #analysis #finite #fixpoint #using
Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
SASSAS-1994-Mauborgne #abstract interpretation #using
Abstract Interpretation Using TDGs (LM), pp. 363–379.
STOCSTOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics #using
Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
FMFME-1994-ErasmyS #case study #refinement #using
Stepwise Refinement of Control Software — A Case Study Using RAISE (FE, ES), pp. 547–566.
FMFME-1994-Evans #concurrent #specification #using #verification
Specifying & Verifying Concurrent Systems Using Z (AE), pp. 366–380.
FMFME-1994-FencottGLOP #algebra #formal method #modelling #process #semantics #using
Formalising the Semantics of Ward/Mellor SA/RT Essential Models using a Process Algebra (PCF, AG, MAL, SJO, SP), pp. 681–702.
FMFME-1994-PaechR #automaton #behaviour #concept #modelling #refinement
A new Concept of Refinement used for Behaviour Modelling with Automata (BP, BR), pp. 154–174.
FMFME-1994-RitchieBH #automaton #case study #experience #using
Experiences in Using the Abstract Machine Notation in a GKS Case Study (BR, JB, HPH), pp. 93–104.
FMFME-1994-StoreyH #using
A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
LISPLFP-1994-AdityaFH #garbage collection #re-engineering #runtime #using
Garbage Collection for Strongly-Typed Languages Using Run-Time Type Reconstruction (SA, CHF, JEH), pp. 12–23.
LISPLFP-1994-DeanC #towards #using
Towards Better Inlining Decisions Using Inlining Trials (JD, CC), pp. 273–282.
LISPLFP-1994-Hall #representation #type inference #using
Using Hindley-Milner Type Inference to Optimise List Representation (CVH), pp. 162–172.
LISPLFP-1994-HuelsbergenLA #data type #runtime #thread #using
Using the Run-Time Sizes of Data Structures to Guide Parallel-Thread Creation (LH, JRL, AA), pp. 79–90.
LISPLFP-1994-Tolmach #garbage collection #parametricity #using
Tag-Free Garbage Collection Using Explicit Type Parameters (APT), pp. 1–11.
ICGTTAGT-1994-BlosteinFG #graph grammar
Issues in the Practical Use of Graph Rewriting (DB, HF, AG), pp. 38–55.
ICGTTAGT-1994-Drewes #algebra #graph #transducer
The Use of Tree Transducers to Compute Translations Between Graph Algebras (FD), pp. 196–210.
ICGTTAGT-1994-Wills #graph #parsing #source code #using
Using Attributed Flow Graph Parsing to Recognize Clichés in Programs (LMW), pp. 170–184.
CHICHI-1994-GoldsteinR94a #query #scalability #set #using
Using aggregation and dynamic queries for exploring large data sets (JG, SFR), pp. 23–29.
CHICHI-1994-Newman94a #analysis #human-computer #research #using
A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
CHICHI-1994-Ogozalek94a #comparison #interface #multi
A comparison of the use of text and multimedia interfaces to provide information to the elderly (VZO), pp. 65–71.
CHICHI-1994-RothKMG94a #automation #design #interactive #using
Interactive graphic design using automatic presentation knowledge (SFR, JK, JM, JG), pp. 112–117.
CHICHI-1994-Strommen94a #interface
Children’s use of mouse-based interfaces to control virtual travel (ES), pp. 405–410.
CHICHI-1994-WalkerSS94a #interface #using
Using a human face in an interface (JHW, LS, RS), pp. 85–91.
CSCWCSCW-1994-EvelandBBM #network #tool support
The Role of “Help Networks” in Facilitating Use of CSCW Tools (JDE, ALB, WB, JM), pp. 265–274.
CSCWCSCW-1994-FurutaS #collaboration #protocol #prototype
Interpreted Collaboration Protocols and Their Use in Groupware Prototyping (RF, PDS), pp. 121–131.
CSCWCSCW-1994-KatzenbergM #summary
Meaning-Making in the Creation of Useful Summary Reports (BK, JPM), pp. 199–206.
CSCWCSCW-1994-KrautRCF #communication #social
Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium (REK, RER, CC, RSF), pp. 13–21.
CSCWCSCW-1994-OkamuraOFY
Helping CSCW Applications Succeed: The Role of Mediators in the Context of Use (KO, WJO, MF, JY), pp. 55–65.
CSCWCSCW-1994-PrakashS #collaboration #named #performance #using
DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects (AP, HSS), pp. 153–164.
CSCWCSCW-1994-TrevorRM #adaptation
The Use of Adapters to Support Cooperative Sharing (JT, TR, JAM), pp. 219–230.
CSCWCSCW-1994-WanJ #approach #collaboration #learning #using
Computer Supported Collaborative Learning Using CLARE: The Approach and Experimental Findings (DW, PMJ), pp. 187–198.
AdaEuropeAdaEurope-1994-BarbeyB #ada #data type #specification #testing #using
Testing Ada Abstract Data Types Using Formal Specifications (SB, DB), pp. 76–89.
AdaTRI-Ada-1994-KayloeL #ada #architecture #named #using
Easy-Sim: Using Ada 9X in a Graphics System Software Architecture (JRK, PKL), pp. 164–169.
CAiSECAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience #using
From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
CAiSECAiSE-1994-Rosengren #query #using #visual notation
Using Visual ER Query Systems in Real World Applications (PR), pp. 394–405.
CAiSECAiSE-1994-SeoL #data type #formal method #process #reuse #using
Formalisation of Data and Process Model Reuse Using Hierarchic Data Types (DS, PL), pp. 256–268.
CIKMCIKM-1994-HalperGPK #using
Integrating a Part Relationship Into an Open OODB System Using Metaclasses (MH, JG, YP, WK), pp. 10–17.
CIKMCIKM-1994-KwonKC #adaptation #query #using
Query Expansion Using Domain Adapted, Weighted Thesaurus in an Extended Boolean Model (OWK, MCK, KSC), pp. 140–146.
CIKMCIKM-1994-LeeL #database #object-oriented #query #using
Using Path Information for Query Processing in Object-Oriented Database Systems (DLL, WCL), pp. 64–71.
CIKMCIKM-1994-LehmannC #integration #prototype #reliability #semantics #using
The EGG/YOLK Reliability Hierarchy : Semantic Data Integration Using Sorts with Prototypes (FL, AGC), pp. 272–279.
CIKMCIKM-1994-RezendeH #abstraction #semantics #using
A Lock Method for KBMSs Using Abstraction Relationships’ Semantics (FdFR, TH), pp. 112–121.
CIKMCIKM-1994-SyuL #information retrieval #using
A Competition-Based Connectionist Model for Information Retrieval Using a Merged Thesaurus (IS, SDL), pp. 164–170.
ICMLICML-1994-CravenS #network #query #using
Using Sampling and Queries to Extract Rules from Trained Neural Networks (MC, JWS), pp. 37–45.
ICMLICML-1994-OpitzS #knowledge-based #network #search-based #using
Using Genetic Search to Refine Knowledge-based Neural Networks (DWO, JWS), pp. 208–216.
KDDKDD-1994-BerndtC #using
Using Dynamic Time Warping to Find Patterns in Time Series (DJB, JC), pp. 359–370.
KDDKDD-1994-Kaufman #development #learning #multi #tool support #using
Comparing International Development Patterns Using Multi-Operator Learning and Discovery Tools (KAK), pp. 431–440.
KDDKDD-1994-SasisekharanSW #machine learning #maintenance #network #using
Proactive Network Maintenance Using Machine Learning (RS, VS, SMW), pp. 453–462.
KDDKDD-1994-ShenMOZ #database #deduction #induction #learning #using
Using Metagueries to Integrate Inductive Learning and Deductive Database Technology (WMS, BGM, KO, CZ), pp. 335–346.
KRKR-1994-Gotts #how #using
How Far Can We “C”? Defining a “Doughnut” Using Connection Alone (NMG), pp. 246–257.
KRKR-1994-McIlraith #abduction #generative #testing #using
Generating Tests Using Abduction (SAM), pp. 449–460.
SEKESEKE-1994-AbranDMMS #analysis #hypermedia #learning #using
Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
SEKESEKE-1994-FigueiredoPC #analysis #fuzzy #petri net #realtime #using
Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
SEKESEKE-1994-Holm #communication #modelling
The COMMODIOUS method — COMmunication MODelling as an aid to Illustrate the Organisational Use of Software (PH), pp. 10–19.
SEKESEKE-1994-KoskinenPS #dependence #hypermedia #using
Program text as hypertext: using program dependences for transient linking (JK, JP, AS), pp. 209–216.
SEKESEKE-1994-ReynoldsZ #algorithm #learning #using
Learning to understand software from examples using cultural algorithms (RGR, EZ), pp. 188–192.
SEKESEKE-1994-SuzukiT #abstraction #behaviour #retrieval #using
Associative program retrieval using partially-ordered behavioral abstractions of a program (HS, NT), pp. 395–404.
SIGIRSIGIR-1994-BruzaH #axiom #using
Investigating Aboutness Axioms using Information Fields (PB, TWCH), pp. 112–121.
SIGIRSIGIR-1994-Gey #probability #using
Inferring Probability of Relevance Using the Method of Logistic Regression (FCG), pp. 222–231.
SIGIRSIGIR-1994-Hoch #analysis #classification #documentation #information retrieval #using
Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
SIGIRSIGIR-1994-Hull #problem #retrieval #semantics #using
Improving Text Retrieval for the Routing Problem using Latent Semantic Indexing (DAH), pp. 282–291.
SIGIRSIGIR-1994-Voorhees #query #semantics #using
Query Expansion Using Lexical-Semantic Relations (EMV), pp. 61–69.
ECOOPECOOP-1994-OkamuraI #programming #using
Object Location Control Using Meta-level Programming (HO, YI), pp. 299–319.
OOPSLAOOPSLA-1994-AmielGS #multi #optimisation #using
Optimizing Multi-Method Dispatch Using Compressed Dispatch Tables (EA, OG, ES), pp. 244–258.
OOPSLAOOPSLA-1994-BogleL #using
Reducing Cross Domain Call Overhead using Batched Futures (PB, BL), pp. 341–354.
OOPSLAOOPSLA-1994-Seidewitz #inheritance #self #using
Genericity versus Inheritance Reconsidered: Self-Reference Using Generics (ES), pp. 153–163.
TOOLSTOOLS-EUROPE-1994-CharltonLR #database #inheritance #persistent #using
Using Inheritance to Provide Subschema Views in a Shared Persistent Object Database (CCC, PHL, MR), pp. 419–428.
TOOLSTOOLS-EUROPE-1994-Graham #analysis #case study #object-oriented #process #re-engineering #requirements
Beyond the Use Case: Combining Task Analysis and Scripts in Object-Oriented Requirements Capture and Business Process Re-engineering (IMG), pp. 203–215.
TOOLSTOOLS-EUROPE-1994-Meyer #inheritance #named
Keynote: Uses and Misuses of Inheritance (BM), p. 9.
TOOLSTOOLS-EUROPE-1994-PereiraD #case study #comparison #experience #object-oriented #realtime #using
Using Object-Orientation in Real-Time Applications: An Experience Report or (1 Application + 5 Approaches = 1 Comparison) (CEP, PD), pp. 147–158.
TOOLSTOOLS-EUROPE-1994-RuperezJA #behaviour #object-oriented #rule-based #simulation #using
Embedding of Rule-based Expert System Capabilities in Object-Oriented Applications by Using or Simulating Active Behaviour (RFR, CJ, JRZA), pp. 315–327.
TOOLSTOOLS-EUROPE-1994-SurendharA #evolution #object-oriented #using
Object-Oriented Type Evolution Using Reflection (MS, SA), pp. 271–280.
PPDPALP-1994-Miller #logic programming #multi #source code #specification #using
Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
LOPSTRLOPSTR-1994-BoulangerB #analysis #logic programming #program transformation #using
Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
LOPSTRLOPSTR-1994-FlenerP #induction #on the #reasoning #synthesis
On the Use of Inductive Reasoning in Program Synthesis: Prejudice and Prospects (PF, LP), pp. 69–87.
LOPSTRLOPSTR-1994-MarakakisG #data type #design #logic programming #source code #top-down #using
Schema-Based Top-Down Design of Logic Programs Using Abstract Data Types (EIM, JPG), pp. 138–153.
PPDPPLILP-1994-BelkhirN #functional #logic #towards #using
Towards Integrating Functional and Logic Styles Using Relation (AB, NN), pp. 463–464.
PPDPPLILP-1994-BoulangerBD #approach #using
Abstracting s-semantincs Using A Model-Theoretic Approach (DB, MB, MD), pp. 432–446.
PPDPPLILP-1994-MetzemakersMSS #performance #using
Improving Arithmetic Performance using Fine-Grain Unfolding (TM, AM, DS, RS), pp. 324–339.
PPDPPLILP-1994-Miller #logic programming #multi #source code #specification #using
Specifications Using Multiple-Conclusion Logic Programs (DM), pp. 3–4.
PPDPPLILP-1994-Serrano #analysis #compilation #control flow #functional #higher-order #using
Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
POPLPOPL-1994-DiwanTM #garbage collection #memory management #performance #source code #using
Memory Subsystem Performance of Programs Using Copying Garbage Collection (AD, DT, JEBM), pp. 1–14.
POPLPOPL-1994-TofteT #call-by #implementation #stack #using #λ-calculus
Implementation of the Typed Call-by-Value λ-Calculus using a Stack of Regions (MT, JPT), pp. 188–201.
REICRE-1994-Alford #complexity #requirements #using
Attacking requirements complexity using a separation of concerns (MWA), pp. 2–5.
REICRE-1994-GoldinB #abstraction #design #elicitation #evaluation #natural language #prototype #requirements
AbstFinder, a prototype abstraction finder for natural language text for use in requirements elicitation: design, methodology, and evaluation (LG, DMB), pp. 84–93.
REICRE-1994-MaidenS #abstraction #requirements #using
Requirements critiquing using domain abstractions (NAMM, AGS), pp. 184–193.
REICRE-1994-ReizerAMP #formal method #requirements #specification #standard #using
Using formal methods for requirements specification of a proposed POSIX standard (NRR, GDA, BCM, PRHP), pp. 118–125.
SACSAC-1994-AbualiSW #algorithm #design #network #probability #search-based #using
Designing telecommunications networks using genetic algorithms and probabilistic minimum spanning trees (FNA, DAS, RLW), pp. 242–246.
SACSAC-1994-ChandH #realtime #using
A real-time contol application using asynchronous remote procedure calls (GC, DMH), pp. 515–517.
SACSAC-1994-ConnorCKM #evolution #persistent #using
Using persistence technology to control schema evolution (RCHC, QIC, GNCK, RM), pp. 441–446.
SACSAC-1994-FlachsbartBCH #algorithm #classification #using
Using the ID3 symbolic classification algorithm to reduce data density (BF, WEB, DCSC, JH), pp. 292–296.
SACSAC-1994-Foster #analysis #education #named #using
FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
SACSAC-1994-GentherG #automation #classification #clustering #fuzzy #generative #using
Automatic generation of a fuzzy classification system using fuzzy clustering methods (HG, MG), pp. 180–183.
SACSAC-1994-Konstam #algorithm #classification #search-based #using
N-group classification using genetic algorithms (AHK), pp. 212–216.
SACSAC-1994-KumarH #concept #fuzzy #logic #reduction #using
Reduction of communications in a MasPar computer using fuzzy logic concepts (AGK, JH), pp. 351–356.
SACSAC-1994-Lutsky #documentation #parsing #testing #using
Using a document parser to automate software testing (PL), pp. 59–63.
SACSAC-1994-PalmS #fuzzy #logic #optimisation #using
Torque optimization for a locomotive using fuzzy logic (RP, KS), pp. 105–109.
SACSAC-1994-RogersU #linear #using
A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.
SACSAC-1994-RosenG #network #using
Training hard to learn networks using advanced simulated annealing methods (BER, JMG), pp. 256–260.
SACSAC-1994-Sen94a #network #using
File placement over a network using simulated annealing326741 (SS), pp. 251–255.
SACSAC-1994-Shearer #design #multi #using
Design of a Linda kernal using causal multicast (KS), pp. 518–523.
SACSAC-1994-WarwickT #algorithm #problem #search-based #using
Using a genetic algorithm to tackle the processors configuration problem (TW, EPKT), pp. 217–221.
SACSAC-1994-WongD #hybrid #stack #thread #using
Supporting thousands of threads using a hybrid stack sharing scheme (KFW, BD), pp. 493–498.
SACSAC-1994-XiaoW #algorithm #search-based #using
Molecular docking using genetic algorithms (YLX, DEW), pp. 196–200.
FSEFSE-1994-BatoryTS #compilation #data type #re-engineering #scalability #using
Reengineering a Complex Application Using a Scalable Data Structure Compiler (DSB, JT, MS), pp. 111–120.
FSEFSE-1994-EvansGHT #named #specification #using
LCLint: A Tool for Using Specifications to Check Code (DE, JVG, JJH, YMT), pp. 87–96.
FSEFSE-1994-VandevoordeG #analysis #composition #runtime #using
Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
ICSEICSE-1994-Ardis #lessons learnt #using
Lessons from Using Basic LOTOS (MAA), pp. 5–14.
ICSEICSE-1994-DevanbuJ #case study #experience #logic
The Use of Description Logics in KBSE Systems: Experience Report (PTD, MAJ), pp. 23–35.
ICSEICSE-1994-YasumotoHT #process #using
Software Process Description Using LOTOS and Its Enaction (KY, TH, KT), pp. 169–178.
ASPLOSASPLOS-1994-GallagherCMGH #ambiguity #memory management #using
Dynamic Memory Disambiguation Using the Memory Conflict Buffer (DMG, WYC, SAM, JCG, WmWH), pp. 183–193.
ASPLOSASPLOS-1994-YoungS #branch #correlation #predict #using
Improving the Accuracy of Static Branch Prediction Using Branch Correlation (CY, MDS), pp. 232–241.
CCCC-1994-Binkley #constant #data flow #dependence #graph #interprocedural #using
Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model (DB), pp. 374–388.
HPDCHPDC-1994-AgrawalCLS #using
Investigating Weak Memories Using Maya (DA, MC, HVL, AKS), pp. 123–130.
HPDCHPDC-1994-ArmstrongM #distributed #framework #parallel
The Use of Frameworks for Scientific Computation in a Parallel Distributed Environment (RCA, JM), pp. 15–25.
HPDCHPDC-1994-NguyenZZ #distributed #problem #using
Distributed Computation of Electromagnetic Scattering Problems Using Finite-Difference Time-Domain Decompositions (SN, BJZ, XZ), pp. 85–89.
HPDCHPDC-1994-Stevens #multi
Multimedia Supercomputing: The Use of Supercomputers to Drive High-Performance Multimedia Systems and Virtual Environments (RS), p. 3.
CADECADE-1994-BronsardRH #induction #order #using
Induction using Term Orderings (FB, USR, RWH), pp. 102–117.
CADECADE-1994-ChuP #first-order #proving #semantics #theorem proving #using
Semantically Guided First-Order Theorem Proving using Hyper-Linking (HC, DAP), pp. 192–206.
CADECADE-1994-McPheeCG #geometry #proving #theorem #using
Mechanically Proving Geometry Theorems Using a Combination of Wu’s Method and Collins’ Method (NFM, SCC, XSG), pp. 401–415.
CAVCAV-1994-BouajjaniER #hybrid #linear #using #verification
Verification of Context-Free Timed Systems Using Linear Hybrid Observers (AB, RE, RR), pp. 118–131.
CAVCAV-1994-DamsGDHKP #abstraction #adaptation #model checking #using
Model Checking Using Adaptive State and Data Abstraction (DD, RG, GD, RH, PK, HP), pp. 455–467.
CAVCAV-1994-GorrieriS #realtime #using #verification
Real-Time System Verification using P/T Nets (RG, GS), pp. 14–26.
CAVCAV-1994-Graf #abstraction #distributed #memory management #using #verification
Verification of a Distributed Cache Memory by Using Abstractions (SG), pp. 207–219.
CAVCAV-1994-HojatiMB #graph #using
Improving Language Containment Using Fairness Graphs (RH, RBMT, RKB), pp. 391–403.
CAVCAV-1994-NaikS #model checking #modelling #protocol #using #verification
Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking (VGN, APS), pp. 194–206.
CAVCAV-1994-OliveroSY #abstraction #hybrid #linear #using #verification
Using Abstractions for the Verification of Linear Hybrid Systems (AO, JS, SY), pp. 81–94.
ICLPILPS-1994-Cras #constraints #logic programming #using
Using Constraint Logic Programming in Services: A Few Short Tales (YC), pp. 3–16.
ICLPILPS-1994-JourdanFRD #concurrent #constraints #modelling #parallel #programming #scheduling #using
Data Alignment and Task Scheduling On Parallel Machines Using Concurrent Constraint Model-based Programming (JJ, FF, DR, AD), p. 678.
ICLPILPS-1994-Ross #constraints #using
A Syntactic Stratification Condition Using Constraints (KAR), pp. 76–90.
ISSTAISSTA-1994-Karam #timeline #using #visualisation
Visualization using Timelines (GMK), pp. 125–137.
ISSTAISSTA-1994-MurrillM #approach #fault #semantics #using
An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (Abstract) (BWM, LJM), p. 200.
DACDAC-1993-ChakradharDPR #optimisation #using
Sequential Circuit Delay optimization Using Global Path Delays (STC, SD, MP, SGR), pp. 483–489.
DACDAC-1993-ChengK #automation #finite #functional #generative #state machine #testing #using
Automatic Functional Test Generation Using the Extended Finite State Machine Model (KTC, ASK), pp. 86–91.
DACDAC-1993-ChouCC #finite #modelling #performance #simulation #using
High-Speed Interconnect Modeling and High-Accuracy Simulation Using SPICE and Finite Element Methods (TYC, JC, ZJC), pp. 684–690.
DACDAC-1993-HamadaCC #approach #linear #named #network #using
Prime: A Timing-Driven Placement Tool using A Piecewise Linear Resistive Network Approach (TH, CKC, PMC), pp. 531–536.
DACDAC-1993-HeebPR #modelling #using
Frequency Domain Microwave Modeling Using Retarded Partial Element Equivalent Circuits (HH, SP, AER), pp. 702–706.
DACDAC-1993-IqbalPDP #algebra #using
Critical Path Minimization Using Retiming and Algebraic Speed-Up (ZI, MP, SD, ACP), pp. 573–577.
DACDAC-1993-LadageL #algorithm #using
Resistance Extraction using a Routing Algorithm (LL, RL), pp. 38–42.
DACDAC-1993-LamBS #modelling #using
Circuit Delay Models and Their Exact Computation Using Timed Boolean Functions (WKCL, RKB, ALSV), pp. 128–134.
DACDAC-1993-LiaoDWC #metaprogramming #network #polynomial #using
S-Parameter Based Macro Model of Distributed-Lumped Networks Using Exponentially Decayed Polynomial Function (HL, WWMD, RW, FYC), pp. 726–731.
DACDAC-1993-LiuCS #behaviour #simulation #using #verification
Analog System Verification in the Presence of Parasitics Using Behavioral Simulation (EWYL, HCC, ALSV), pp. 159–163.
DACDAC-1993-MandayamV #attribute grammar #performance #specification #using
Performance Specification Using Attributed Grammars (RM, RV), pp. 661–667.
DACDAC-1993-MotoharaHMMKSS #algorithm #matrix #traversal #using
A State Traversal Algorithm Using a State Covariance Matrix (AM, TH, MM, HM, KK, YS, SS), pp. 97–101.
DACDAC-1993-OhlrichEGS #algorithm #identification #morphism #named #performance #using
SubGemini: Identifying SubCircuits using a Fast Subgraph Isomorphism Algorithm (MO, CE, EG, LS), pp. 31–37.
DACDAC-1993-PullelaMP #optimisation #reliability #using
Reliable Non-Zero Skew Clock Trees Using Wire Width Optimization (SP, NM, LTP), pp. 165–170.
DACDAC-1993-SantucciCG #behaviour #heuristic #using
Speed up of Behavioral A.T.P.G. using a Heuristic Criterion (JFS, ALC, NG), pp. 92–96.
DACDAC-1993-SuttonBD #design #using
Design Management Using Dynamically Defined Flows (PRS, JBB, SWD), pp. 648–653.
DACDAC-1993-WangDNS #architecture #multi #scalability #synthesis #using
High-Level Synthesis of Scalable Architectures for IIR Filters using Multichip Modules (HW, NDD, AN, KYS), pp. 336–342.
DACDAC-1993-YaoCDNL #using
Cell-Based Hierarchical Pitchmatching Compaction Using Minimal LP (SZY, CKC, DD, SN, CYL), pp. 395–400.
ASEKBSE-1993-KingstonVD #approach #development #evaluation #hybrid #using
Development of an Expert Assistant for Software Evaluation using a Hybrid Approach (GK, RV, PD), p. 26.
ASEKBSE-1993-PerryP #named #reuse
INQUIRE: Predicate-Based Use and Reuse (DEP, SSP), p. 21.
ASEKBSE-1993-Redmiles #empirical #knowledge-based #re-engineering #using
Observations on Using Empirical Studies in Developing a Knowledge-Based Software Engineering Tool (DFR), p. 24.
ICDARICDAR-1993-AgazziK #2d #documentation #image #markov #modelling #normalisation #pseudo #recognition #using
Joint normalization and recognition of degraded document images using pseudo-2D hidden Markov models (OEA, SsK), pp. 155–158.
ICDARICDAR-1993-AminW #network #recognition #using
Hand-printed character recognition system using artificial neural networks (AA, WHW), pp. 943–946.
ICDARICDAR-1993-AraiAN #interactive #network #recognition #using
Intelligent interactive map recognition using neural networks (HA, SA, MN), pp. 922–925.
ICDARICDAR-1993-Bai #multi #recognition #using
Multifont Chinese character recognition using side-stroke-end feature (GB), pp. 794–797.
ICDARICDAR-1993-Baird #documentation #fault #image #modelling
Document image defect models and their uses (HSB), pp. 62–67.
ICDARICDAR-1993-Breul #bound #fault #recognition #using
Recognition of handprinted digits using optimal bounded error matching (TMB), pp. 493–496.
ICDARICDAR-1993-ChenWB #detection #image #keyword #markov #modelling #using
Detecting and locating partially specified keywords in scanned images using hidden Markov models (FC, LW, DSB), pp. 133–138.
ICDARICDAR-1993-DoermannRW #geometry #invariant #recognition #using
Logo recognition using geometric invariants (DSD, ER, IW), pp. 894–897.
ICDARICDAR-1993-GillouxLB #markov #modelling #recognition #using #word
Strategies for handwritten words recognition using hidden Markov models (MG, ML, JMB), pp. 299–304.
ICDARICDAR-1993-HerrmannS #documentation #image #layout #retrieval #using
Retrieval of document images using layout knowledge (PH, GS), pp. 537–540.
ICDARICDAR-1993-HoriuchiTYY #on the #recognition #using
On method of training dictionaries for handwritten character recognition using relaxation matching (TH, KT, KY, HY), pp. 638–641.
ICDARICDAR-1993-HoriuchiTYY93a #image #recognition #using
Stamped character recognition method using range image (TH, KT, HY, KY), pp. 782–785.
ICDARICDAR-1993-ImadeTW #classification #documentation #image #network #segmentation #using
Segmentation and classification for mixed text/image documents using neural network (SI, ST, TW), pp. 930–934.
ICDARICDAR-1993-InoharaKSS #complexity #database #retrieval #using
Retrieval method of textile pictures database using a complexity scale (TI, KK, HS, SS), pp. 699–702.
ICDARICDAR-1993-JainC #analysis #locality #using
Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
ICDARICDAR-1993-JiangKT #recognition #representation #using
Recognition and representation of text characters using rubber band (JJ, WK, HT), pp. 955–958.
ICDARICDAR-1993-Kita #automation #recognition #taxonomy #using
Making a personal recognition dictionary from characters automatically generated by using handwriting model (NK), pp. 76–81.
ICDARICDAR-1993-LamH #markov #modelling #using
Reading constrained text using hierarchical hidden Markov models (SWL, WKH), pp. 151–154.
ICDARICDAR-1993-LeeS #design #modelling #using
Optimal design of reference models using simulated annealing combined with an improved LVQ3 (SWL, HHS), pp. 244–249.
ICDARICDAR-1993-LiiPS #recognition #syntax #using
Address block location using character recognition and address syntax (JL, PWP, SNS), pp. 330–334.
ICDARICDAR-1993-MarukawaKSF #recognition #using
A post-processing method for handwritten Kanji name recognition using Furigana information (KM, MK, YS, HF), pp. 218–221.
ICDARICDAR-1993-MonaganR #graph #representation #using
Appropriate base representation using a run graph (GM, MR), pp. 623–626.
ICDARICDAR-1993-MykaG #automation #documentation #hypermedia #re-engineering #using
Using electronic facsimiles of documents for automatic reconstruction of underlying hypertext structures (AM, UG), pp. 528–532.
ICDARICDAR-1993-NakamuraSANK #string #using
A method for recognizing character strings from maps using linguistic knowledge (AN, OS, MA, CN, HK), pp. 561–564.
ICDARICDAR-1993-OhkuraSSH #on the #using
On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
ICDARICDAR-1993-ParkerJS #using
Thresholding using an illumination model (JRP, CJ, AGS), pp. 270–273.
ICDARICDAR-1993-PasternakN #adaptation #constraints #object-oriented #specification #using
Adaptable drawing interpretation using object-oriented and constraint-based graphic specification (BP, BN), pp. 359–364.
ICDARICDAR-1993-Pavlidis #image #using
Threshold selection using second derivatives of the gray scale image (TP), pp. 274–277.
ICDARICDAR-1993-Pflug #n-gram #recognition #set #using
Using n-grams for the definition of a training set for cursive handwriting recognition (VP), pp. 295–298.
ICDARICDAR-1993-SendaMI #documentation #image #process #recognition #retrieval #using
Document image retrieval system using character candidates generated by character recognition process (SS, MM, KI), pp. 541–546.
ICDARICDAR-1993-SeniorF #using
Using constrained snakes for feature spotting in off-line cursive script (AWS, FF), pp. 305–310.
ICDARICDAR-1993-Sinha #constraints #on the #recognition #using
On using syntactic constraints in text recognition (RMKS), pp. 858–861.
ICDARICDAR-1993-Srihari #modelling #recognition
From pixels to paragraphs: The use of contextual models in text recognition (SNS), pp. 416–423.
ICDARICDAR-1993-StefanoTV #reliability #using
Using entropy for drawing reliable templates (CDS, FT, MV), pp. 345–348.
ICDARICDAR-1993-StrathySK #segmentation #using
Segmentation of handwritten digits using contour features (NWS, CYS, AK), pp. 577–580.
ICDARICDAR-1993-Viard-GaudinNB #2d #algorithm #approach #using
A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
ICDARICDAR-1993-Yan93a #classification #image #nearest neighbour #segmentation #using
Color map image segmentation using optimized nearest neighbor classifiers (HY), pp. 111–114.
ICDARICDAR-1993-YangHT #approximate #automation #identification #using
Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
ICDARICDAR-1993-YoshimuraSY #locality #recognition #using
A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
SIGMODSIGMOD-1993-AnanthanarayananGKLP #approach #object-oriented #relational #using
Using the Co-existence Approach to Achieve Combined Functionality of Object-Oriented and Relational Systems (RA, VG, WK, TJL, HP), pp. 109–118.
SIGMODSIGMOD-1993-BrinkhoffKS #performance #using
Efficient Processing of Spatial Joins Using R-Trees (TB, HPK, BS), pp. 237–246.
SIGMODSIGMOD-1993-LuniewskiSSST #information management #using
Information Organization Using Rufus (AL, PMS, KAS, JS, JT), pp. 560–561.
SIGMODSIGMOD-1993-Mukhopadhyay #using
Interoperability Using APPC (DM), pp. 479–482.
SIGMODSIGMOD-1993-ShatdalN #memory management #parallel #using
Using Shared Virtual Memory for Parallel Join Processing (AS, JFN), pp. 119–128.
SIGMODSIGMOD-1993-WoelkACMSST #dependence #scheduling #using
Task Scheduling Using Intertask Dependencies in Carot (DW, PCA, PC, GM, APS, MPS, CT), pp. 491–494.
VLDBVLDB-1993-ChenR93a #adaptation #database #feedback #query #using
Adaptive Database Buffer Allocation Using Query Feedback (CMC, NR), pp. 342–353.
VLDBVLDB-1993-MillerIR #capacity #integration
The Use of Information Capacity in Schema Integration and Translation (RJM, YEI, RR), pp. 120–133.
VLDBVLDB-1993-ZobelMS #scalability #using
Searching Large Lexicons for Partially Specified Terms using Compressed Inverted Files (JZ, AM, RSD), pp. 290–301.
ICSMECSM-1993-Abd-El-HafizB #library #source code #using
Documenting Programs Using a Library of Tree Structured Plans (SKAEH, VRB), pp. 152–161.
ICSMECSM-1993-EdwardsM #lifecycle #logic #using
Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method (HME, MM), pp. 162–171.
ICSMECSM-1993-LoyallM #analysis #dependence #maintenance #process #using
Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
ICSMECSM-1993-Narat #case study #database #maintenance #relational #using
Using a Relational Database for Software Maintenance: A Case Study (VN), pp. 244–251.
PEPMPEPM-1993-Lawall #induction #partial evaluation #proving #using
Proofs by Structural Induction using Partial Evaluation (JLL), pp. 155–166.
PEPMPEPM-1993-Seward #analysis #polymorphism #strict #using
Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
PLDIPLDI-1993-BarrettZ #memory management #performance #predict #using
Using Lifetime Predictors to Improve Memory Allocation Performance (DAB, BGZ), pp. 187–196.
PLDIPLDI-1993-DuesterwaldGS #analysis #array #data flow #framework #optimisation
A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations (ED, RG, MLS), pp. 68–77.
STOCSTOC-1993-Cesa-BianchiFHHSW #how
How to use expert advice (NCB, YF, DPH, DH, RES, MKW), pp. 382–391.
SASWSA-1993-FergusonH #abstract interpretation #algorithm #performance #using
Fast Abstract Interpretation Using Sequential Algorithms (AF, JH), pp. 45–59.
SASWSA-1993-Roy #challenge #logic programming #source code #static analysis
Challenges in Developing Useful and Practical Static Analysis for Logic Programs (PVR), p. 111.
FMFME-1993-CauR #fault tolerance #refinement #using
Using Relative Refinement for Fault Tolerance (AC, WPdR), pp. 19–41.
FMFME-1993-HaxthausenG #case study #concurrent #using
A Concurrency Case Study Using RAISE (AEH, CG), pp. 367–387.
FPCAFPCA-1993-Nocker #analysis #reduction #strict #using
Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
HCIHCI-ACS-1993-Ala-Siuru #case study #experience #specification #user interface #using
Using QFD Techniques in User Interface Specification: First Experiences (PAS), pp. 456–461.
HCIHCI-ACS-1993-CarayonH
A Diary Study of Computer Use and Worker Stress: Preliminary Results (PC, CH), pp. 715–720.
HCIHCI-ACS-1993-ChasePHH #case study #documentation #using
Task-Oriented User Documentation Using the User Action Notation: A Case Study (JDC, MP, HRH, DH), pp. 421–426.
HCIHCI-ACS-1993-Chung #using
Decision Maker’s Knowledge Level and the Selection of Decision Strategies in Using a Decision Support System (HMMC), pp. 487–491.
HCIHCI-ACS-1993-Hjelmquist #communication #people #using
Communication Between People Using a Computer-Mediated Communication System (EH), pp. 955–960.
HCIHCI-ACS-1993-McFarlane #automation #development
Current Status of Development and Use of Tethered and Autonomous Underwater Vehicles and the Potential for Further Automation (JRM), pp. 301–306.
HCIHCI-ACS-1993-PouraghabagherB #evaluation #eye tracking #monitoring #using
An Evaluation of Information Highlighting Methods on Computer Screens Using an Eye Movement Monitor (RP, DB), pp. 762–767.
HCIHCI-ACS-1993-SaitoSTSS #eye tracking
Characteristics of Vertical Eye Movements in the Workstation Used Flat Panel Display (SS, MS, ST, TS, SS), pp. 756–761.
HCIHCI-ACS-1993-SeppalaT #case study #experience #implementation #industrial
Experiences in the Use and Implementation of Information Technology in the Printing Industry (PKS, ET), pp. 56–61.
HCIHCI-ACS-1993-Sundstrom-Frisk
Near-Accidents in the Use of Advanced Medical Equipment (CSF), pp. 821–826.
HCIHCI-ACS-1993-Vanderheiden #generative #information management #interface #protocol
Use of Seamless Access Protocol to Expand the Hman Interface of Next Generation Information Systems and Appliances (GCV), pp. 492–497.
HCIHCI-SHI-1993-AndersonJBA
The Use of Computer Simulated Cases to Study Factors that Influence Clinical Practice Styles (JGA, SJJ, CB, MMA), pp. 742–747.
HCIHCI-SHI-1993-BorgesBLT #design #education #framework #knowledge base #using
A Framework for Building a Knowledge Based System Using Several Experts — With an Application for Curriculum Design of Engineering Degree Courses (MNB, YB, ML, MTT), pp. 344–349.
HCIHCI-SHI-1993-EnomotoNNS #using
Virtual Kitchen System using Kansei Engineering (NE, MN, JN, KS), pp. 657–662.
HCIHCI-SHI-1993-GodbertPS #concept #constraints #interface #natural language #specification #using
Natural Language Interfaces: Specifying and Using Conceptual Constraints (EG, RP, PS), pp. 385–390.
HCIHCI-SHI-1993-GreavesWO #image #speech #using #visual notation
Enhancing Speech Intelligibility Using Visual Images (CG, MW, ), pp. 1097–1102.
HCIHCI-SHI-1993-HsiA93a #design #education #multi
Use of Multimedia Technology in Teaching Engineering Design (SH, AMA), pp. 778–783.
HCIHCI-SHI-1993-KamalaSC #difference #multi #student
Individual Differences in the Use of Hyper/Multimedia by Undergraduate Students at the University of Hawaii at Manoa (TNK, JS, MEC), pp. 507–512.
HCIHCI-SHI-1993-KamijoK #artificial reality #using
A Virtual Reality System Using Physiological Data — Application to Virtual Sports CAI (KK, AK), pp. 675–680.
HCIHCI-SHI-1993-KatoO #analysis #using
Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
HCIHCI-SHI-1993-KirschA #approach #education #multi #using #visual notation
Using Multimedia to Teach Visual Literacy: A Systematic Approach (RPK, RMA), pp. 531–536.
HCIHCI-SHI-1993-Lowgren #editing #using #visual notation
Using Domain Knowledge to Support Graphical Editing (JL), pp. 421–426.
HCIHCI-SHI-1993-MoriiKT #animation #detection #evaluation #eye tracking #realtime #using
Evaluation of a Gaze Using Real-Time CG Eye-Animation Combined with Eye Movement Detector (KM, FK, NT), pp. 1103–1108.
HCIHCI-SHI-1993-SharitC #reasoning #rule-based
The Use of Expert Systems for Training Humans in Rule-Based Reasoning (JS, SC), pp. 819–824.
HCIHCI-SHI-1993-ShibuyaT #communication #image
Use of Bi-Directional Image Exchange in Facilitating Precontact Communication (YS, HT), pp. 943–948.
HCIHCI-SHI-1993-SillinceM #human-computer #hypermedia #using
Using Argumentation to Overcome Hypertext’s HCI Failings (JAAS, RHM), pp. 639–644.
HCIHCI-SHI-1993-Stelovsky #hypermedia #implementation #parametricity #reuse
Use of Parameters to Facilitate the Implementation of Reusable Hypermedia Modules (JS), pp. 525–530.
HCIHCI-SHI-1993-UenoO #design #network
A Design Guideline Search Method that Uses a Neural Network (KU, KO), pp. 27–32.
HCIHCI-SHI-1993-UetakeNTT #analysis #using
A Meeting Support System Based on Analyses of Human-Communication — Using the Context and Contents of Meetings (TU, MN, KT, HT), pp. 967–972.
HCIHCI-SHI-1993-WatersonO #multi #using
Using Animated Demonstrations in Multimedia Applications: Some Suggestions Based upon Experimental Evidence (PEW, CO), pp. 543–548.
CHIINTERCHI-1993-BerlinJOPW #design #memory management
Where did you put it? Issues in the design and use of a group memory (LMB, RJ, VLO, AP, CW), pp. 23–30.
CHIINTERCHI-1993-BrewsterWE #evaluation #human-computer #interface
An evaluation of earcons for use in auditory human-computer interfaces (SAB, PCW, ADNE), pp. 222–227.
CHIINTERCHI-1993-BrownMS #graph #using
Browsing graphs using a fisheye view (abstract) (MHB, JRM, MS), p. 516.
CHIINTERCHI-1993-Byrne #documentation #using
Using icons to find documents: simplicity is critical (MDB), pp. 446–453.
CHIINTERCHI-1993-HigakiTM #using
A telewriting system on a LAN using a pen-based computer as the terminal (SH, HT, SM), p. 303.
CHIINTERCHI-1993-KabbashMB #performance #using
Human performance using computer input devices in the preferred and non-preferred hands (PK, ISM, WB), pp. 474–481.
CHIINTERCHI-1993-KurtenbachB #performance #using
The limits of expert performance using hierarchic marking menus (GK, WB), pp. 482–487.
CHIINTERCHI-1993-McKerlieM #design #using
QOC in action (abstract): using design rationale to support design (DM, AM), p. 519.
CHIINTERCHI-1993-NardiSKLWS
Turning away from talking heads: the use of video-as-data in neurosurgery (BAN, HS, AK, RL, SW, RJS), pp. 327–334.
CHIINTERCHI-1993-NechesABHHLMS
The Integrated User-Support Environment (IN-USE) Group at USC/ISI (RN, PA, DB, BH, LH, PL, RM, PAS), pp. 53–54.
CHIINTERCHI-1993-SteffenE #interactive #using #visualisation
High interaction data visualization using Seesoft to visualize program change history (abstract) (JLS, SGE), p. 517.
CHIINTERCHI-1993-Wang #using
A groupware engine using UIMS methodologies (abstract) (LW), pp. 249–250.
AdaEuropeAdaEurope-1993-Lundberg #ada #evaluation #parallel #performance #source code #using
Performance Evaluation of Parallel Ada Programs Using an Experimental Multiprocessor (LL), pp. 280–297.
AdaEuropeAdaEurope-1993-Schwille #exception #guidelines
Use and Abuse of Exceptions — 12 Guidelines for Proper Exception Handling (JS), pp. 141–152.
AdaTRI-Ada-1993-DownsDMTT #ada #using
Using X with the ADA Mind-Set (MD, JD, KM, LT, CT), pp. 20–28.
AdaTRI-Ada-1993-GieringMB #ada #design #implementation #thread #using
Implementing Ada 9X Features Using POSIX Threads: Design Issues (EWG, FM, TPB), pp. 214–228.
AdaTRI-Ada-1993-Nickerson #ada #design #representation #using #visual notation
Visual Conventions for System Design Using Ada 9X: Representing Asynchronous Transfer of Control (JVN), pp. 379–384.
AdaTRI-Ada-1993-White #ada #interface #semantics #specification #using
A Universal Delogger Using the Ada Semantic Interface Specification (ASIS) (MW), pp. 347–353.
CAiSECAiSE-1993-GullaW #execution #modelling #using #validation
Using Explanations to Improve the Validation of Executable Models (JAG, GW), pp. 118–142.
CAiSECAiSE-1993-PalanqueBDS #design #interface #petri net #using
Design of User-Driven Interfaces Using Petri Nets and Objects (PAP, RB, LD, CSB), pp. 569–585.
CIKMCIKM-1993-AzarbodP #concept #incremental #integration #using
Building Concept Hierarchies for Schema Integration in HDDBS Using Incremental Concept Formation (CA, WP), pp. 732–734.
CIKMCIKM-1993-LiZ #estimation #predict
An Information Model for Use in Software Management Estimation and Prediction (NRL, MVZ), pp. 481–489.
CIKMCIKM-1993-MehtaGPN #generative #using
The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
CIKMCIKM-1993-Riloff #classification #using
Using Cases to Represent Context for Text Classification (ER), pp. 105–113.
CIKMCIKM-1993-Sussna #ambiguity #for free #network #semantics #using #word
Word Sense Disambiguation for Free-text Indexing Using a Massive Semantic Network (MS), pp. 67–74.
CIKMCIKM-1993-ZhangOCF #data type #optimisation #query #using
A Method of Using Semijoins to Optimizing Queries with ADT Functions (XZ, NO, HC, YF), pp. 723–725.
ICMLICML-1993-Cardie #learning #using
Using Decision Trees to Improve Case-Based Learning (CC), pp. 25–32.
ICMLICML-1993-ClarkM #induction #learning #modelling #using
Using Qualitative Models to Guide Inductive Learning (PC, SM), pp. 49–56.
ICMLICML-1993-CravenS #learning #network #using
Learning Symbolic Rules Using Artificial Neural Networks (MC, JWS), pp. 73–80.
ICMLICML-1993-Schlimmer #algorithm
Efficiently Inducing Determinations: A Complete and Systematic Search Algorithm that Uses Optimal Pruning (JCS), pp. 284–290.
ICMLICML-1993-VanLehnJ #problem
Better Learners Use Analogical Problem Solving Sparingly (KV, RMJ), pp. 338–345.
SEKESEKE-1993-BachateneCS #design #re-engineering #using
Using Software Engineering Principles to Design Intelligent Cooperative Systems (HB, MC, AEFS), pp. 309–313.
SEKESEKE-1993-LeloucheV #automation #knowledge-based #testing #using
Using the Inference Engine Strategy in the Automatic Construction of Test Cases for a Knowledge-Based System (RL, LV), pp. 388–395.
SEKESEKE-1993-Paterno #logic #user interface #using
Definition of Properties of User Interfaces Using Action-Based Temporal Logic (FP), pp. 314–318.
SEKESEKE-1993-PirriP #datalog #deduction #design #taxonomy #using
Using Datalog as a Language for Data Dictionary Design: A Deductive Support (FP, CP), pp. 304–308.
SEKESEKE-1993-ReynoldsM #metric #process #programming language #refinement
The Use of Refinement Metrics to Assess Programming Language Support for the Stepwise Refinement Process (RGR, JIM), pp. 150–157.
SIGIRSIGIR-1993-CallanC #evaluation #query #using
An Evaluation of Query Processing Strategies Using the TIPSTER Collection (JPC, WBC), pp. 347–355.
SIGIRSIGIR-1993-Hull #evaluation #retrieval #statistics #testing #using
Using Statistical Testing in the Evaluation of Retrieval Experiments (DAH), pp. 329–338.
SIGIRSIGIR-1993-Kupiec #approach #named #online #robust #using
MURAX: A Robust Linguistic Approach for Question Answering Using an On-Line Encyclopedia (JK), pp. 181–190.
SIGIRSIGIR-1993-Voorhees #retrieval #using #word
Using WordNet to Disambiguate Word Senses for Text Retrieval (EMV), pp. 171–180.
OOPSLAOOPSLA-1993-BalK #runtime #using
Object Distribution in Orca using Compile-Time and Run-Time Techniques (HEB, MFK), pp. 162–177.
OOPSLAOOPSLA-1993-BinghamHH #case study #experience #library #object-oriented #using
Experiences Developing and Using an Object-Oriented Library for Program Manipulation (TB, NH, DH), pp. 83–89.
OOPSLAOOPSLA-1993-GodinM #maintenance #using
Building and Maintaining Analysis-Level Class Hierarchies Using Galois Lattices (RG, HM), pp. 394–410.
OOPSLAOOPSLA-1993-LiskovW #specification #type system
Specifications and Their Use in Defining Subtypes (BL, JMW), pp. 16–28.
OOPSLAOOPSLA-1993-MatsuokaTY #concurrent #encapsulation #object-oriented #performance
Highly Efficient and Encapsulated Re-use of Synchronization Code in Concurrent Object-Oriented Languages (SM, KT, AY), pp. 109–126.
TOOLSTOOLS-EUROPE-1993-DecooninckNJ #modelling #object-oriented #using
Satellite Modeling Using Object-Oriented Technologies (ASD, PN, FJ), pp. 19–30.
TOOLSTOOLS-EUROPE-1993-Jacobson #approach #case study #object-oriented #re-engineering
Object-Oriented Software Engineering — a Use Case Driven Approach (IJ), p. 333.
TOOLSTOOLS-EUROPE-1993-KetabchiS #analysis #automation #documentation #generative #maintenance #using
Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
TOOLSTOOLS-EUROPE-1993-Sylla #concept #modelling
Associated Paper: Modeling Concepts used by Professionals (KHS), pp. 255–258.
TOOLSTOOLS-PACIFIC-1993-Dew #agile #concept #object-oriented #prototype #realtime #using
A Rapid Prototyping System for Real-time Systems Using Object-oriented Concepts (RAD), pp. 279–291.
TOOLSTOOLS-PACIFIC-1993-Grant #ada #object-oriented #paradigm #re-engineering #using
Software Engineering Using the Object-Oriented Paradigm: The Promise of Ada 9X (DDG), p. 329.
TOOLSTOOLS-PACIFIC-1993-LingD #comparison #concurrent #object-oriented #paradigm #specification #using
A Comparison of Techniques for Specifying Concurrent Systems Using the Object-Oriented Paradigm (SL, BD), pp. 155–177.
TOOLSTOOLS-USA-1993-Brandis #c++ #design #scalability #using
An O-O Case History: Large System Design Using C++ (CB), p. 534.
TOOLSTOOLS-USA-1993-VideiraS #c++ #design #development #framework #using
Using C++ in the Development of an Electronic Design Framework (IV, HS), pp. 255–264.
LOPSTRLOPSTR-1993-BoulangerB #abstract interpretation #using
Using Abstract Interpretation for Goal Replacement (DB, MB), pp. 210–228.
LOPSTRLOPSTR-1993-Johansson #incremental #interactive #using
Interactive Program Derivation Using Program Schemata and Incrementally Generated Strategies (ALJ), pp. 100–112.
LOPSTRLOPSTR-1993-MaddenHGB #automation #generative #performance #proving #source code #theorem proving
A General Technique for Automatically Generating Efficient Programs Through the Use of Proof Planning (Abstract) (PM, JH, IG, AB), pp. 64–66.
PPDPPLILP-1993-JourdanBPR #attribute grammar #implementation #specification #using
Specification and Implementation of Grammar Couplings using Attribute Grammars (MJ, CLB, DP, GR), pp. 123–136.
PPDPPLILP-1993-Moreno-NavarroKMWH #analysis #lazy evaluation #performance #using
Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
PPDPPLILP-1993-Poetzsch-Heffter #programming language #prototype #specification #using
Programming Language Specification and Prototyping Using the MAX System (APH), pp. 137–150.
POPLPOPL-1993-BatesH #dependence #graph #incremental #testing #using
Incremental Program Testing Using Program Dependence Graphs (SB, SH), pp. 384–396.
POPLPOPL-1993-Lakhotia #dependence #graph #multi #using
Constructing Call Multigraphs Using Dependence Graphs (AL), pp. 273–284.
POPLPOPL-1993-MaydanAL #analysis #array #data flow
Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
REICRE-1993-HoffmannD #design #execution #process #prototype #specification #using
Using Executable Specifications for Prototyping System Design Process (CH, BD), pp. 135–145.
RERE-1993-AndersonD #requirements #using
Using scenarios in deficiency-driven requirements engineering (JSA, BD), pp. 134–141.
RERE-1993-GreenspanF #paradigm #requirements #using
Requirements engineering using the SOS paradigm (SJG, MF), pp. 260–263.
RERE-1993-IshiharaSK #dependence #natural language #specification #using
A translation method from natural language specifications into formal specifications using contextual dependencies (YI, HS, TK), pp. 232–239.
RERE-1993-RyanM #concept #graph #requirements
Matching conceptual graphs as an aid to requirements re-use (KR, BM), pp. 112–120.
SACSAC-1993-AguirreBBG #information management #prototype #representation #using
Using a High Level Knowledge Representation for Expert Systems Knowledge Acquisition and Prototyping (JLA, OB, RFB, MNG), pp. 490–497.
SACSAC-1993-ChewSK #object-oriented
Use of Object-Oriented Structures to Represent Knowledge in Expert Systems (GC, MS, AK), pp. 498–503.
SACSAC-1993-Konstam #algorithm #analysis #linear #search-based #using
Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
SACSAC-1993-ObaidatA #generative #video
An Intelligent Video Pattern Generator for Use in Ophthalmology (MSO, DSAS), pp. 660–664.
SACSAC-1993-RankinW #combinator #fixpoint #prolog #using
Finding Fixed Point Combinators Using Prolog (RR, RWW), pp. 604–608.
SACSAC-1993-Sen #low cost #probability #set #using
Minimal Cost Set Covering Using Probabilistic Methods (SS), pp. 157–164.
SACSAC-1993-ThangiahN #adaptation #using
Dynamic Trajectory Routing Using an Adaptive Search Method (SRT, KEN), pp. 131–138.
ESECESEC-1993-JengC #component #formal method #library #using
Using Formal Methods to Construct a Software Component Library (JJJ, BHCC), pp. 397–417.
FSEFSE-1993-AbowdAG #architecture #using
Using Style to Understand Descriptions of Software Architecture (GDA, RA, DG), pp. 9–20.
FSEFSE-1993-Wood #approach #calculus #re-engineering #refinement #using
A Practical Approach to Software Engineering Using Z and the Refinement Calculus (KRW), pp. 79–88.
ICSEICSE-1993-BastaniDP #correctness #evaluation #using
Experimental Evaluation of a Fuzzy-Set Based Measure of Software Correctness Using Program Mutation (FBB, GD, AP), pp. 45–54.
ICSEICSE-1993-GerhartCR #formal method #industrial #using
Observations on Industrial Practice Using Formal Methods (SLG, DC, TR), pp. 24–33.
ICSEICSE-1993-OrnburnL #component #generative #using
Building, Modifying and Using Component Generators (SBO, RJL), pp. 391–402.
ICSEICSE-1993-Zelkowitz #classification
Use of an Environment Classification Model (MVZ), pp. 348–357.
HPDCHPDC-1993-ColombetDM #modelling #network #using
Star Modeling on IBM RS6000 Networks Using PVM (LC, LD, FM), pp. 121–128.
HPDCHPDC-1993-CrutcherLFZ #3d #network #using
Management of Broadband Networks Using a 3D Virtual World (LAC, AAL, SF, MXZ), pp. 306–315.
HPDCHPDC-1993-MukherjeeS #adaptation #concurrent #configuration management #multi #performance #thread
Improving Performance by Use of Adaptive Objects: Experimentation with a Configurable Multiprocessor Thread Package (BM, KS), pp. 59–66.
HPDCHPDC-1993-TanenbaumBK #distributed #programming #using
Programming a Distributed System Using Shared Objects (AST, HEB, MFK), pp. 5–12.
PPoPPPPoPP-1993-HallHKMMOPR #case study #editing #experience #interactive #parallel #programming #using
Experiences Using the ParaScope Editor: an Interactive Parallel Programming Tool (MWH, TJH, KK, NM, KSM, JDO, MHP, GR), pp. 33–43.
PPoPPPPoPP-1993-KontothanassisW #performance #using
Using Scheduler Information to Achieve Optimal Barrier Synchronization Performance (LIK, RWW), pp. 64–72.
PPoPPPPoPP-1993-Siegl #algorithm #symbolic computation #using
Parallelizing Algorithms for Symbolic Computation using ||MAPLE|| (KS), pp. 179–186.
SOSPSOSP-1993-HauserJTWW #case study #interactive #thread #using
Using Threads in Interactive Systems: A Case Study (CH, CJ, MT, BBW, MW), pp. 94–105.
CAVCAV-1993-GuptaF #induction #parametricity #representation #using
Parametric Circuit Representation Using Inductive Boolean Functions (AG, ALF), pp. 15–28.
CAVCAV-1993-HojatiBK #debugging #design #using
BDD-Based Debugging Of Design Using Language Containment and Fair CTL (RH, RKB, RPK), pp. 41–58.
CAVCAV-1993-HuD #invariant #performance #using #verification
Efficient Verification with BDDs using Implicitly Conjoined Invariants (AJH, DLD), pp. 3–14.
CAVCAV-1993-Peled #model checking #using
All from One, One for All: on Model Checking Using Representatives (DP), pp. 409–423.
CAVCAV-1993-Shankar #realtime #using #verification
Verification of Real-Time Systems Using PVS (NS), pp. 280–291.
CSLCSL-1993-BaazZ #equivalence #proving #using
Short Proofs of Tautologies Using the Schema of Equivalence (MB, RZ), pp. 33–35.
ICLPICLP-1993-CarlssonG #automation #constraints #using
Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques (MC, MG), pp. 647–665.
ICLPICLP-1993-LiRSVBPPSCDRSS #named #parallel #using
APPLAUSE: Applications Using the ElipSys Parallel CLP System (LLL, MR, KS, AV, JB, CP, ZP, TS, DAC, SD, CJR, JS, GS), pp. 847–848.
ICLPILPS-1993-BerryE #generative #query #recursion
Generating Goals and Their Use In Recursive Query Processing (VB, ), p. 649.
ICLPILPS-1993-BoizumaultDP #problem #using
Solving a real life exams problem using CHIP (PB, YD, LP), p. 661.
ICLPILPS-1993-CodishD #logic programming #source code #using
Analysing Logic Programs Using “Prop”-ositional Logic Programs and a Magic Wand (MC, BD), pp. 114–129.
ICLPILPS-1993-CodognetD #constraints #theorem proving #using
Boolean Constraint Solving Using clp(FD) (PC, DD), pp. 525–539.
ICLPILPS-1993-Vargas-VeraVR #editing #prolog #scalability #source code #using
Building Large-Scale Prolog Programs using a Techniques Editing System (MVV, WWV, DSR), p. 636.
ISSTAISSTA-1993-AvritzerL #testing #using
Load Testing Software Using Deterministic State Testing (AA, BL), pp. 82–88.
ISSTAISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction #using
Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
ISSTAISSTA-1993-UntchOH #analysis #mutation testing #using
Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
ICTSSIWPTS-1993-UlrichK #using
Test Derivation from LOTOS Using Structure Information (AU, HK), pp. 279–293.
ICTSSIWPTS-1993-WittemanW #network #principle #testing #using
ATM Broadband Network Testing Using the Ferry Principle (MFW, RCvW), pp. 125–138.
DACDAC-1992-BamjiV #design #using
Hierarchical Pitchmatching Compaction Using Minimum Design (CB, RV), pp. 311–317.
DACDAC-1992-BergamaschiLK #behaviour #optimisation #synthesis #using
Control Optimization in High-Level Synthesis Using Behavioral Don’t Cares (RAB, DAL, AK), pp. 657–661.
DACDAC-1992-BhattacharyaAA #fault #generative #testing #using
Delay Fault Test Generation for Scan/Hold Circuits Using Boolean Expressions (DB, PA, VDA), pp. 159–164.
DACDAC-1992-GennartL #simulation #using #validation
Validating Discrete Event Simulations Using Event Pattern Mappings (BAG, DCL), pp. 414–419.
DACDAC-1992-JuS #incremental #simulation #using
Incremental Circuit Simulation Using Waveform Relaxation (YCJ, RAS), pp. 8–11.
DACDAC-1992-KimLS #graph #layout #modelling #using
A New Hierarchical Layout Compactor Using Simplified Graph Models (WK, JL, HS), pp. 323–326.
DACDAC-1992-KrishnamoorthyN #using
Data Path Allocation using an Extended Binding Model (GK, JAN), pp. 279–284.
DACDAC-1992-LeeR #analysis #evaluation #linear #named #using
AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
DACDAC-1992-Malik #multi #network #optimisation #using
Optimization of Primitive Gate Networks Using Multiple Output Two-Level Minimization (AAM), pp. 449–453.
DACDAC-1992-PomeranzC #using
State Assignment Using Input/Output Functions (IP, KTC), pp. 573–577.
DACDAC-1992-RundensteinerG #functional #optimisation #synthesis #using
Functional Synthesis Using Area and Delay Optimization (EAR, DG), pp. 291–296.
HTHT-ECHT-1992-FreiS #hypermedia
Making Use of Hypertext Links when Retrieving Information (HPF, DS), pp. 102–111.
HTHT-ECHT-1992-Gibbs #hypermedia #video
Video Nodes and Video Webs: Uses of Video in Hypermedia (SJG), p. 3.
HTHT-ECHT-1992-GuinanS #hypermedia #information retrieval #using
Information Retrieval from Hypertext using Dynamically Planned Guided Tours (CG, AFS), pp. 122–130.
HTHT-ECHT-1992-WiilL #distributed #hypermedia #named #using
Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems (UKW, JJL), pp. 251–261.
HTHT-ECHT-1992-ZhengP #hypermedia #using
Using Statecharts to Model Hypertext (YZ, MCP), pp. 242–250.
SIGMODSIGMOD-1992-AgrawalAJ #database #protocol #realtime #using
Using Delayed Commitment in Locking Protocols for Real-Time Databases (DA, AEA, RJ), pp. 104–113.
SIGMODSIGMOD-1992-Bamford #consistency #multi #performance #using
Using Multiversioning to Improve Performance Without Loss of Consistency (RB), p. 164.
SIGMODSIGMOD-1992-JhingranK #analysis #database #protocol #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
SIGMODSIGMOD-1992-LanzelotteVZ #object-oriented #optimisation #query #recursion #using
Optimization of Object-Oriented Recursive Queries using Cost-Controlled Strategies (RSGL, PV, MZ), pp. 256–265.
SIGMODSIGMOD-1992-MohanL #concurrent #named #performance #using
ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
VLDBVLDB-1992-AnsariNRS #flexibility #multi #transaction #using
Using Flexible Transactions to Support Multi-System Telecommunication Applications (MA, LN, MR, APS), pp. 65–76.
VLDBVLDB-1992-ChenLYY #execution #pipes and filters #using
Using Segmented Right-Deep Trees for the Execution of Pipelined Hash Joins (MSC, MLL, PSY, HCY), pp. 15–26.
VLDBVLDB-1992-Raz #multi #principle #using
The Principle of Commitment Ordering, or Guaranteeing Serializability in a Heterogeneous Environment of Multiple Autonomous Resource Mangers Using Atomic Commitment (YR), pp. 292–312.
CSEETSEI-1992-WildeG #re-engineering
Use of the Individual Exchange Project Model in an Undergraduate Software Engineering Laboratory (NW, JKG), pp. 339–348.
ESOPESOP-1992-Levaire #case study #programming #using
Using the Centaur System to for Data-Parallel SIMD Programming: A Case Study (JLL), pp. 341–350.
PEPMPEPM-1992-RufW #analysis #control flow #higher-order #using
Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
PLDIPLDI-1992-GranlundK #branch #c #compilation #using
Eliminating Branches using a Superoptimizer and the GNU C Compiler (TG, RK), pp. 341–352.
PLDIPLDI-1992-HanxledenK #constraints #control flow #using
Relaxing SIMD Control Flow Constraints using Loop Transformations (RvH, KK), pp. 188–199.
PLDIPLDI-1992-PughW #data flow #dependence #using
Eliminating False Data Dependences using the Omega Test (WP, DW), pp. 140–151.
SASWSA-1992-GiannottiL #abstract interpretation #specification #using
Using Abstract Interpretation for Gate splitting in LOTOS Specifications (FG, DL), pp. 194–204.
LISPLFP-1992-CooperNS #garbage collection #memory management #performance #using
Improving the Performance of SML Garbage Collection Using Application-Specific Virtual Memory Management (EC, SN, IS), pp. 43–52.
CHICHI-1992-FrankGGF #user interface #using
Building User Interfaces Interactively Using Pre- and Postconditions (MRF, JJdG, DFG, JDF), pp. 641–642.
CHICHI-1992-Hill #constraints #paradigm #user interface #using
The abstraction-link-view paradigm: using constraints to connect user interfaces to applications (RDH), pp. 335–342.
CHICHI-1992-KitajimaP #user interface #visual notation
A Computational Model of Skilled Use of a Graphical User Interface (MK, PGP), pp. 241–249.
CHICHI-1992-Muller #design #using
Retrospective on a year of participatory design using the PICTIVE technique (MJM), pp. 455–462.
CHICHI-1992-SellenBA #using
Using Spatial Cues to Improve Videoconferencing (AS, WB, JLA), pp. 651–652.
CSCWCSCW-1992-HymesO #editing
Unblocking Brainstorming Through the Use of a Simple Group Editor (CMH, GMO), pp. 99–106.
CSCWCSCW-1992-TakemuraK #using
Cooperative Work Environment Using Virtual Workspace (HT, FK), pp. 226–232.
AdaEuropeAdaEurope-1992-BayassiBJL #ada #distributed #paradigm
A Practical Use of the Ada Rendez-Vous Paradigm in Distributed Systems (MB, HB, JFJ, PL), pp. 312–324.
AdaEuropeAdaEurope-1992-DuellSW #ada #code generation #scalability #source code #using
Using Ada Source Code Generators in a Large Project (RD, HJS, FCAdW), pp. 47–59.
AdaEuropeAdaEurope-1992-Groeneveld #ada #using
Using Ada in Integrating ATC Systems (MG), pp. 72–79.
AdaEuropeAdaEurope-1992-LooneyO #ada #distributed #using
Distributed Application Designed Using MASCOT and Implemented in Ada (MJL, AO), pp. 1–8.
AdaTRI-Ada-C-1992-Beidler #component #education #tool support #what
Building on the Booch Components: What Can Be Learned When Modifying Real World Software Tools for Educational Use (JB), pp. 157–164.
AdaTRI-Ada-C-1992-Blair #ada #configuration management #library #using #version control
Managing Ada Using Rational’s Configuration Management/Version Control and IBM’s Software Configuration Library Manager (DJB), pp. 424–431.
AdaTRI-Ada-C-1992-Carmichael #architecture #design #object-oriented #using
Defining Software Architectures Using the Hierarchical Object-Oriented Design Nethod (HOOD) (ARC), pp. 211–219.
AdaTRI-Ada-C-1992-CramerD #ada #fault tolerance
The Use of Ada to Achieve Fault Tolerance in AAS (RSC, JDD), pp. 545–552.
AdaTRI-Ada-C-1992-GieringB #ada #thread #using
Using POSIX Threads to Implement Ada Tasking: Description of Work in Progress (EWG, TPB), pp. 518–529.
AdaTRI-Ada-T1-1992-FeldmanP #ada #education #using
Teaching and Using Ada in CS1/CS2 (MBF, REP), pp. 1–59.
KRKR-1992-GreinerS #approximate #learning
Learning Useful Horn Approximations (RG, DS), pp. 383–392.
KRKR-1992-Haas
A Reactive Planner that Uses Explanation Closure (ARH), pp. 93–102.
KRKR-1992-Konolige #reasoning #using
Using Default and Causal Reasoning in Diagnosis (KK), pp. 509–520.
KRKR-1992-Nayak #order #reasoning #using
Order of Magnitude Reasoning using Logarithms (PPN), pp. 201–210.
ICMLML-1992-GiordanaS #algorithm #concept #learning #search-based #using
Learning Structured Concepts Using Genetic Algorithms (AG, CS), pp. 169–178.
ICMLML-1992-McCallum #learning #performance #proximity #using
Using Transitional Proximity for Faster Reinforcement Learning (AM), pp. 316–321.
ICMLML-1992-OliveiraS #feature model #induction #using
Constructive Induction Using a Non-Greedy Strategy for Feature Selection (ALO, ALSV), pp. 355–360.
ICMLML-1992-OmlinG #higher-order #network #using
Training Second-Order Recurrent Neural Networks using Hints (CWO, CLG), pp. 361–366.
SEKESEKE-1992-ReynoldsMZ #induction #using
Extracting Procedural Knowledge from Software Systems Using Inductive Leaning in the PM system (RGR, JIM, EZ), pp. 131–139.
SEKESEKE-1992-SatoMI #refinement #using
Program Refinement Using Generic Object (YS, YM, TI), pp. 18–25.
SEKESEKE-1992-Wong #incremental #library #using
Using Version Spaces to Support Incremental Searches in a Software Library (YCW), pp. 412–419.
SIGIRSIGIR-1992-BlossevilleHMP #analysis #automation #classification #documentation #natural language #statistics
Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
SIGIRSIGIR-1992-Grefenstette #retrieval
Use of Syntactic Context to Produce Term Association Lists for Text Retrieval (GG), pp. 89–97.
SIGIRSIGIR-1992-MasandLW #memory management #reasoning #using
Classifying News Stories using Memory Based Reasoning (BMM, GL, DLW), pp. 59–65.
SIGIRSIGIR-1992-RobertsonW #database #using
Searching for Historical Word-Forms in a Database of 17th-Century English Text Using Spelling-Correction Methods (AMR, PW), pp. 256–265.
ECOOPECOOP-1992-Gabelgaard #implementation #object-oriented #programming #using
Using Object-Oriented Programming Techniques for Implementing ISDN Supplementary Services (BG), pp. 213–232.
ECOOPECOOP-1992-Holland #component #contract #reuse #specification #using
Specifying Reusable Components Using Contracts (IMH), pp. 287–308.
OOPSLAOOPSLA-1992-EggenschwilerG #using
ET++ Swaps Manager: Using Object Technology in the Financial Engineering Domain (TE, EG), pp. 166–177.
OOPSLAOOPSLA-1992-Johnson #framework #using
Documenting Frameworks using Patterns (REJ), pp. 63–76.
TOOLSTOOLS-EUROPE-1992-DojatP #prototype #representation #smalltalk #using
Representation of a Medical Expertise using the Smalltalk Environment: Putting a Prototype to Work (MD, FP), pp. 379–389.
TOOLSTOOLS-EUROPE-1992-Steinmuller #industrial
Qualifying C++-Foundation Classes for Use in Industrial Applications (US), pp. 47–59.
TOOLSTOOLS-EUROPE-1992-Zhao #approach #geometry #object-oriented #online #recognition #using
On-Line Geometry Recognition Using C++, an Object-Oriented Approach (RZ), pp. 371–378.
TOOLSTOOLS-PACIFIC-1992-Goldberg #object-oriented #question #using
Can A Manager Be Successful Using Object-Oriented Technology? (AG), p. 3.
TOOLSTOOLS-PACIFIC-1992-MaE #approach #library #relational #using
A Practical Approach to Class Library Management Using a Relational DBMS (JM, JME), pp. 165–173.
TOOLSTOOLS-PACIFIC-1992-McNamara #development #object-oriented
Objects in Context: the Use of Scope in Object-Oriented Development (ARM), pp. 205–211.
TOOLSTOOLS-USA-1992-FirthOFBN #development #object-oriented #using
Improving a software development environment using object-oriented technology (MAF, MHO, REF, SKB, TCN), pp. 41–49.
LOPSTRLOPSTR-1992-BoulangerB #abstract interpretation #logic programming #source code #using
Deriving Transformations for Logic Programs Using Abstract Interpretation (DB, MB), pp. 99–117.
PPDPPLILP-1992-Hanus #functional #logic programming #source code #using
Improving Control of Logic Programs by Using Functional Logic Languages (MH), pp. 1–23.
PPDPPLILP-1992-PenningsSV #evaluation #incremental #using
Using Cached Functions and Constructors for Incremental Attribute Evaluation (MP, SDS, HV), pp. 130–144.
ICSEICSE-1992-HorwitzR #dependence #graph #re-engineering
The Use of Program Dependence Graphs in Software Engineering (SH, TWR), pp. 392–411.
SOSPSOSP-WIP-1991-HartyC92 #memory management #physics #using
Application-Controlled Physical Memory using External Page-Cache Management (Abstract) (KH, DRC), p. 19.
ASPLOSASPLOS-1992-HartyC #memory management #physics #using
Application-Controlled Physical Memory using External Page-Cache Management (KH, DRC), pp. 187–197.
ASPLOSASPLOS-1992-PanSR #branch #correlation #predict #using
Improving the Accuracy of Dynamic Branch Prediction Using Branch Correlation (STP, KS, JTR), pp. 76–84.
CCCC-1992-Grosch #pattern matching #using
Transformation of Attributed Trees Using Pattern Matching (JG), pp. 1–15.
CCCC-1992-Samples #compilation #data type #implementation #using
Compiler Implementation of ADTs Using Profile Data (ADS), pp. 72–87.
CADECADE-1992-FegarasSS #combinator #traversal
Uniform Traversal Combinators: Definition, Use and Properties (LF, TS, DWS), pp. 148–162.
CADECADE-1992-HeskethBS #reasoning #recursion #source code #synthesis #using
Using Middle-Out Reasoning to Control the Synthesis of Tail-Recursive Programs (JH, AB, AS), pp. 310–324.
CADECADE-1992-Uribe #constraints #set #unification #using
Sorted Unification Using Set Constraints (TEU), pp. 163–177.
CADECADE-1992-WalshNB #proving #theorem proving
The Use of Proof Plans to Sum Series (TW, AN, AB), pp. 325–339.
CAVCAV-1992-HamaguchiHY #branch #design #logic #using #verification
Design Verification of a Microprocessor Using Branching Time Regular Temporal Logic (KH, HH, SY), pp. 206–219.
CAVCAV-1992-McMillan #explosion #problem #using #verification
Using Unfoldings to Avoid the State Explosion Problem in the Verification of Asynchronous Circuits (KLM), pp. 164–177.
CAVCAV-1992-WrightL #algorithm #concurrent #proving #reasoning #theorem proving #using
Using a Theorem Prover for Reasoning about Concurrent Algorithms (JvW, TL), pp. 56–68.
ICLPJICSLP-1992-BigotDM #abstract interpretation #analysis #comprehension #using
Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
DACDAC-1991-BergamaschiCP #analysis #synthesis #using
Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
DACDAC-1991-Burch #multi #using #verification
Using BDDs to Verify Multipliers (JRB), pp. 408–412.
DACDAC-1991-CardenC #algorithm #approximate #multi #performance #using
A Global Router Using An Efficient Approximate Multicommodity Multiterminal Flow Algorithm (RCCI, CKC), pp. 316–321.
DACDAC-1991-ChakrabortyBBL #testing #using
Enhanced Controllability for IDDQ Test Sets Using Partial Scan (TJC, SB, RB, CJL), pp. 278–281.
DACDAC-1991-Harrison #layout #using
VLSI Layout Compaction Using Radix Priority Search Trees (AJH), pp. 732–735.
DACDAC-1991-HolmesSS #algorithm #using
New Algorithm for Over-the-Cell Channel Routing Using Vacant Terminals (NDH, NAS, MS), pp. 126–131.
DACDAC-1991-PomeranzR #fault #on the #using
On Achieving a Complete Fault Coverage for Sequential Machines Using the Transition Fault Model (IP, SMR), pp. 341–346.
DACDAC-1991-ShihK #approach #equation #named #performance #using
ILLIADS: A New Fast MOS Timing Simulator Using Direct Equation-Solving Approach (YHS, SMK), pp. 20–25.
DACDAC-1991-SoeK #logic #using
Logic Minimization using Two-column Rectangle Replacement (SS, KK), pp. 470–473.
DACDAC-1991-Utesch #adaptation #approach #interactive #using
A New Approach to Hierarchical Adaptation Using Sequence-Control Based on Cell Interactions (MCU), pp. 723–726.
DACDAC-1991-WalkerKS #database #editing #process #representation #statistics
A Semiconductor Wafer Representation Database and Its Use in the PREDITOR Process Editor and Statistical Simulator (DMHW, CSK, AJS), pp. 579–584.
ASEKBSE-1991-Setliff #using
Using Domain Knowledge to Synthesize Routing Software (DES), pp. 77–82.
HTHT-1991-BassettiPS #effectiveness #hypermedia #using
Applications Navigator: Using Hypertext to Support Effective Scientific Information Exchange (OB, DP, MS), pp. 411–416.
HTHT-1991-CreechFG #component #hypermedia #reuse #using
Using Hypertext in Selecting Reusable Software Components (MLC, DFF, MLG), pp. 25–38.
HTHT-1991-NanardN #hypermedia #using
Using Structured Types to Incorporate Knowledge in Hypertext (JN, MN), pp. 329–343.
PODSPODS-1991-Matsliach #analysis #multi #performance
Performance Analysis of File Organizations that Use Multi-Bucket Data Leaves with Partial Expansions (GM), pp. 164–180.
PODSPODS-1991-SohnG #detection #logic programming #source code #termination #using
Termination Detection in Logic Programs using Argument Sizes (KS, AVG), pp. 216–226.
SIGMODSIGMOD-1991-AgrawalK #execution #multi #transaction #using
Using Multiversion Data for Non-interfering Execution of Write-only Transactions (DA, VK), pp. 98–107.
VLDBVLDB-1991-Elmasri #modelling #using
Conecptual Modeling Using and Extended E-R Model (Abstract) (RE), p. 67.
VLDBVLDB-1991-SullivanS #data type #database #fault tolerance #using
Using Write Protected Data Structures To Improve Software Fault Tolerance in Highly Available Database Management Systems (MS, MS), pp. 171–180.
PEPMPEPM-1991-KhooS #compilation #inheritance #partial evaluation #using
Compiling Inheritance using Partial Evaluation (SCK, RSS), pp. 211–222.
PEPMPEPM-1991-McNerney #abstract interpretation #compilation #correctness #using #verification
Verifying the Correctness of Compiler Transformations on Basic Blocks using Abstract Interpretation (TSM), pp. 106–115.
PEPMPEPM-1991-RufW #using
Using Types to Avoid Redundant Specialization (ER, DW), pp. 321–333.
PEPMPEPM-1991-ShermanSD #equation #optimisation #partial evaluation #source code #using
Optimization of Equational Programs Using Partial Evaluation (DS, RS, ID), pp. 72–82.
PEPMPEPM-1991-Sundaresh #incremental #partial evaluation #source code #using
Building Incremental Programs using Partial Evaluation (RSS), pp. 83–93.
PEPMPEPM-1991-Wadler #linear #logic #question
Is There a Use for Linear Logic? (PW), pp. 255–273.
PLDIPLDI-1991-Wall #behaviour #predict #using
Predicting Program Behavior Using Real or Estimated Profiles (DWW), pp. 59–70.
STOCSTOC-1991-Adleman #integer #using
Factoring Numbers Using Singular Integers (LMA), pp. 64–71.
STOCSTOC-1991-BarnesR #algorithm #polynomial #sublinear #using
Deterministic Algorithms for Undirected s-t Connectivity Using Polynomial Time and Sublinear Space (Extended Abstract) (GB, WLR), pp. 43–53.
STOCSTOC-1991-KushilevitzM #fourier #learning #using
Learning Decision Trees Using the Fourier Sprectrum (Extended Abstract) (EK, YM), pp. 455–464.
PLDIBest-of-PLDI-1991-Wall91a #behaviour #predict #using
Predicting program behavior using real or estimated profiles (with retrospective) (DWW), pp. 429–441.
ICALPICALP-1991-ChazelleEGGHSS #using
Ray Shooting in Polygons Using Geodesic Triangulations (BC, HE, MG, LJG, JH, MS, JS), pp. 661–646.
ICALPICALP-1991-LagergrenA #congruence #finite #using
Finding Minimal Forbidden Minors Using a Finite Congruence (JL, SA), pp. 532–543.
FMVDME-1991-1-BicarreguiR #reasoning #using
Reasoning about VDM Developments using the VDM Support Tool in MURAL (JB, BR), pp. 371–388.
FMVDME-1991-1-Bril #algebra #specification #using
A Model-Oriented Method for Algebraic Specification using COLD-1 as Notation (RJB), pp. 106–124.
FMVDME-1991-1-ChalmersDGPZ #using
Using RAISE — First Impressions from the LaCoS Applications (DLC, BD, JG, JSP, EZ), pp. 645–657.
FMVDME-1991-1-HoustonK #case study #cics #experience
CICS Project Report: Experiences and Results from the use of Z in IBM (IH, SK), pp. 588–596.
FMVDME-1991-1-MarshallS #framework #object-oriented #using
Using VDM within an Object-Oriented Framework (LSM, LS), pp. 619–628.
FPCAFPCA-1991-Fradet #continuation #detection #thread #using
Syntactic Detection of Single-Threading Using Continuations (PF), pp. 241–258.
CHICHI-1991-BrennanDLMSF #interface #question
Should we or shouldn’t we use spoken commands in voice interfaces? (PB, GD, DL, MM, ECS, MF), pp. 369–372.
CHICHI-1991-Mackay91a #guidelines #question #video
Ethical issues in the use of video: is it time to establish guidelines? (WEM), pp. 403–405.
CHICHI-1991-ManteiBSBMW #case study #experience
Experiences in the use of a media space (MMM, RMB, AS, WB, TM, BW), pp. 203–208.
CHICHI-1991-MurakamiT #gesture #network #recognition #using
Gesture recognition using recurrent neural networks (KM, HT), pp. 237–242.
CHICHI-1991-RobertsonMC91a #3d #animation #interactive #using #visualisation
Information visualization using 3D interactive animation (GGR, JDM, SKC), pp. 461–462.
CHICHI-1991-Schultz #visual notation
A graphical reflection notation used in an intelligent discovery world tutoring system (JS), pp. 433–434.
CHICHI-1991-SiochiH #analysis #case study #evaluation #user interface #using
A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
CHICHI-1991-Stasko #algorithm #animation #using
Using direct manipulation to build algorithm animations by demonstration (JTS), pp. 307–314.
CHICHI-1991-TetzlaffS #design #guidelines #interface
The use of guidelines in interface design (LT, DRS), pp. 329–333.
AdaEuropeAdaEurope-1991-ChengU #ada #petri net #using
Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets (JC, KU), pp. 125–146.
AdaEuropeAdaEurope-1991-CurtisS #ada #modelling #using
Modelling the Temporal Summation of Neural Membranes Using the Ada Language (MCC, VJDS), pp. 2–19.
AdaEuropeAdaEurope-1991-DelisT #ada #assessment #design #static analysis #using
Design Assessment of Ada Systems Using Static Analysis (AD, WMT), pp. 227–250.
AdaEuropeAdaEurope-1991-ElradW #3d #ada
The Use of Ada in Reactive Systems: A 3-Dimensional Model (TE, VW), pp. 20–36.
AdaEuropeAdaEurope-1991-GilbertTB #ada #embedded #experience #process #realtime #using
Experience Developing two Ada Applications for Embedded Real-Time Systems Using Different Software Processes (BG, MT, GB), pp. 394–403.
AdaEuropeAdaEurope-1991-SouposG #ada #distributed #object-oriented #transaction #using
Using Ada to Implement the Transaction Mechanism of a Distributed Object-Oriented DBMS (PS, SG), pp. 252–259.
CAiSECAiSE-1991-HillstonOP #case study #using
A Case Study Using the IMSE Experimentation Tool (JH, ALO, RP), pp. 284–306.
CAiSECAiSE-1991-KrogstieMOS #development #information management #process #rule-based #using
Information Systems Development Using a Combination of Process and Rule Based Approaches (JK, PM, RO, AHS), pp. 319–335.
KDDKDD-1991-ChenM #estimation #summary #using
Summary Data Estimation Using Decision Trees (MCC, LM), pp. 309–324.
KDDKDD-1991-Frawley #induction #statistics #using
Using Functions to Encode Domain and Contextual Knowledge in Statistical Induction (WJF), pp. 261–276.
KDDKDD-1991-SmythG #induction #using
Rule Induction Using Information Theory (PS, RMG), pp. 159–176.
KDDKDD-1991-UthurusamyFS #learning
Learning Useful Rules from Inconclusive Data (RU, UMF, WSS), pp. 141–158.
KRKR-1991-RodiP #using
A Nonmonotonic Assumption-Based TMS Using Stable Bases (WLR, SGP), pp. 485–495.
ICMLML-1991-BottaRSS #abduction #learning #using
Improving Learning Using Causality and Abduction (MB, SR, LS, SBS), pp. 480–484.
ICMLML-1991-HummeS #using
Using Inverse Resolution to Learn Relations from Experiments (DH, CS), pp. 412–416.
ICMLML-1991-Jones #refinement #using
Knowledge Refinement Using a High Level, Non-Technical Vocabulary (EKJ), pp. 18–22.
ICMLML-1991-Kwok #adaptation #architecture #learning #query #using
Query Learning Using an ANN with Adaptive Architecture (KLK), pp. 260–264.
ICMLML-1991-ThompsonLI #concept #using
Using Background Knowledge in Concept Formation (KT, PL, WI), pp. 554–558.
SIGIRSIGIR-1991-CroftTL #information retrieval #query
The Use of Phrases and Structured Queries in Information Retrieval (WBC, HRT, DDL), pp. 32–45.
SIGIRSIGIR-1991-Sutcliffe #distributed #information retrieval #using
Distributed Representations in a Text Based Information Retrieval System: A New Way of Using the Vector Space Model (RFES), pp. 123–132.
SIGIRSIGIR-1991-WilkinsonH #documentation #network #using
Using the Cosine Measure in a Neural Network for Document (RW, PH), pp. 202–210.
ECOOPECOOP-1991-MedeirosP #using
Object Integrity Using Rules (CBM, PP), pp. 219–230.
OOPSLAOOPSLA-1991-HansonHR #case study #database #experience #implementation #object-oriented #persistent #programming language #tool support #using
Experiences in DBMS Implementation Using an Object-Oriented Persistent Programming Language and a Database Toolkit (ENH, TMH, MAR), pp. 314–328.
OOPSLAOOPSLA-1991-Hayes #using
Using Key Object Opportunism to Collect Old Objects (BH), pp. 33–46.
OOPSLAOOPSLA-1991-KonstanR #object-oriented #programming #using
Developing a GUIDE Using Object-Oriented Programming (JAK, LAR), pp. 75–88.
TOOLSTOOLS-USA-1991-Goldberg #named #object-oriented #question #using
Keynote: Can a Manager Be Successful Using Object-Oriented Technology? (AG), p. 5.
TOOLSTOOLS-USA-1991-KitchelM #using
Using Descriptor Classes in O-O Systems (SWK, NLM), pp. 167–178.
LOPSTRLOPSTR-1991-AlexandreBQ #logic programming #on the #source code #using
On Using Mode Input-output for Transforming Logic Programs (FA, KB, AQ), pp. 129–146.
LOPSTRLOPSTR-1991-JiaoG #database #object-oriented #optimisation #prolog #query #using
Query Optimization in an Object-Oriented Database using Prolog (Extende Abstract) (ZJ, PMDG), pp. 332–334.
LOPSTRLOPSTR-1991-SolnonR #design #object-oriented #prolog #prototype #using
Using a Prolog Prototype for Designing an Object Oriented Scheme (CS, MR), pp. 300–317.
PPDPPLILP-1991-ErtlK #constraints #logic programming #scheduling #using
Optimal Instruction Scheduling using Constraint Logic Programming (MAE, AK), pp. 75–86.
POPLPOPL-1991-PinterP #optimisation #parallel #using
Program Optimization and Parallelization Using Idioms (SSP, RYP), pp. 79–92.
ESECESEC-1991-Feldman #challenge #configuration management
Software Configuration Management: Past Uses and Future Challenges (SIF), pp. 1–6.
ICSEICSE-1991-GorlickR #analysis #using
Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
ICSEICSE-1991-Hartman #composition #comprehension #source code #using
Understanding Natural Programs Using Proper Decomposition (JH), pp. 62–73.
ICSEICSE-1991-RustonMC #design
Designing Software for Use by Humans, not Machines (LR, MJM, KDC), pp. 104–113.
PPoPPPPoPP-1991-YangC #metalanguage #program transformation #using
Parallel-Program Transformation Using A Metalanguage (JAY, YiC), pp. 11–20.
SOSPSOSP-1991-DravesBRD #communication #concurrent #continuation #operating system #thread #using
Using Continuations to Implement Thread Management and Communication in Operating Systems (RD, BNB, RFR, RWD), pp. 122–136.
CAVCAV-1991-BarbeauB #approach #fault #petri net #using #verification
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach (MB, GvB), pp. 103–113.
CAVCAV-1991-DillHW #simulation #using
Checking for Language Inclusion Using Simulation Preorders (DLD, AJH, HWT), pp. 255–265.
CAVCAV-1991-GodefroidW #concurrent #partial order #performance #safety #using #verification
Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties (PG, PW), pp. 332–342.
CAVCAV-1991-HamaguchiHY #branch #logic #model checking #using #verification
Formal Verification of Speed-Dependent Asynchronous Cicuits Using Symbolic Model Checking of branching Time Regular Temporal Logic (KH, HH, SY), pp. 410–420.
CAVCAV-1991-Mutz #behaviour #correctness #proving #term rewriting #using
Using the HOL Prove Assistant for proving the Correctness of term Rewriting Rules reducing Terms of Sequential Behavior (MM), pp. 277–287.
CAVCAV-1991-SegerJ #using #verification
A Two-Level Formal Verification Methodology using HOL and COSMOS (CJHS, JJJ), pp. 299–309.
ICLPICLP-1991-ColussiM #axiom #correctness #logic programming #proving #semantics #source code #using
Proving Correctness of Logic Programs Using Axiomatic Semantics (LC, EM), pp. 629–642.
ICLPICLP-1991-FujitaH #algorithm #generative #proving #theorem proving #using
A Model Generation Theorem Prover in KL1 Using a Ramified -Stack Algorithm (HF, RH), pp. 535–548.
ICLPICLP-1991-Marre #algebra #automation #logic programming #specification #testing #towards #using
Toward Automatic Test Data Set Selection Using Algebraic Specifications and Logic Programming (BM), pp. 202–219.
ICLPICLP-1991-Monin #compilation #prolog #using
Real-size Compiler Writing Using Prolog with Arrows (JFM), pp. 188–201.
ICLPICLP-1991-SatohI #abduction #using
Computing Abduction by Using the TMS (KS, NI), pp. 505–518.
ICLPICLP-1991-VerschaetseS #logic programming #proving #source code #termination #using
Deriving Termination Proofs for Logic Programs, Using Abstract Procedures (KV, DDS), pp. 301–315.
ICLPISLP-1991-FosterKT #composition #parallel #programming #source code #using
Using Compositional Programming to Write Portable, High-Performance Parallel Programs (ITF, CK, ST), pp. 737–738.
ICLPISLP-1991-Szeredi #prolog #using
Using Dynamic Predicates in an Or--Parallel Prolog System (PS), pp. 355–371.
ICTSSIWPTS-1991-CavalliK #consistency #generative #graph grammar #protocol #term rewriting #testing #using
Protocol Conformance Test Generation Using a Graph Rewriting System (ARC, SUK), pp. 285–288.
RTARTA-1991-DenneheuvelKLS #optimisation #query #using
Query Optimization Using Rewrite Rules (SvD, KLK, GRRdL, ES), pp. 252–263.
ISSTATAV-1991-DuesterwaldS #analysis #concurrent #data flow #framework #using
Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
ISSTATAV-1991-FranklW #comparison #effectiveness
An Experimental Comparison of the Effectiveness of the All-Uses and All-Edges Adequacy Criteria (PGF, SNW), pp. 154–164.
ISSTATAV-1991-LongC #analysis #concurrent #data flow
Data Flow Analysis of Concurrent Systems that Use the Rendezvous Model of Synchronization (DLL, LAC), pp. 21–35.
ISSTATAV-1991-PandeL #c #interprocedural #source code
Interprocedural Def-Use Associations in C Programs (HDP, WL), pp. 139–153.
ISSTATAV-1991-YehY #algebra #analysis #composition #process #reachability #using
Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
DACDAC-1990-BurchCMD #model checking #using #verification
Sequential Circuit Verification Using Symbolic Model Checking (JRB, EMC, KLM, DLD), pp. 46–51.
DACDAC-1990-ChakradharAB #automation #generative #polynomial #programming #testing #using
Automatic Test Generation Using Quadratic 0-1 Programming (STC, VDA, MLB), pp. 654–659.
DACDAC-1990-CompasanoB #algorithm #scheduling #synthesis #using
Synthesis Using Path-Based scheduling: algorithms and Exercises (RC, RAB), pp. 450–455.
DACDAC-1990-DonathNABHKLM #using
Timing Driven Placement Using Complete Path Delays (WED, RJN, BKA, SEB, SYH, JMK, PL, RIM), pp. 84–89.
DACDAC-1990-HungWGS #parallel #simulation #using
Parallel Circuit Simulation Using Hierarchical Relaxation (GGH, YCW, KG, RAS), pp. 394–399.
DACDAC-1990-IshiuraDY #diagrams #simulation #using
Coded Time-Symbolic Simulation Using Shared Binary Decision Diagram (NI, YD, SY), pp. 130–135.
DACDAC-1990-KucukcakarP #trade-off #using
Data Path Tradeoffs Using MABAL (KK, ACP), pp. 511–516.
DACDAC-1990-KundaARN #generative #testing #using
Speed Up of Test Generation Using High-Level Primitives (RPK, JAA, BDR, PN), pp. 594–599.
DACDAC-1990-MartelloLC #using #verification
Timing Verification Using HDTV (ARM, SPL, DMC), pp. 118–123.
DACDAC-1990-SavojB #multi #network
The Use of Observability and External Don’t Cares for the Simplification of Multi-Level Networks (HS, RKB), pp. 297–301.
SIGMODSIGMOD-1990-BernsteinHM #implementation #using
Implementing Recoverable Requests Using Queues (PAB, MH, BM), pp. 112–122.
VLDBVLDB-1990-BhargavaB #adaptation #using
Adaptable Recovery Using Dynamic Quorum Assignments (BKB, SB), pp. 231–242.
VLDBVLDB-1990-KemperM #data access #query #using
Advanced Query Processing in Object Bases Using Access Support Relations (AK, GM), pp. 290–301.
VLDBVLDB-1990-PucheralTV #data transformation #in memory #memory management #performance #using
Efficient Main Memory Data Management Using the DBGraph Storage Model (PP, JMT, PV), pp. 683–695.
CSEETSEI-1990-CiochM #documentation
Use-Perspective Unit Documentation (FAC, FM), pp. 136–144.
ESOPESOP-1990-Romanenko
Arity Raiser and its Use in Program Specialization (SAR), pp. 341–360.
PLDIPLDI-1990-Wendt #code generation #performance #using
Fast Code Generation Using Automatically-Generated Decision Trees (ALW), pp. 9–15.
STOCSTOC-1990-EvenR #distributed #network
The Use of a Synchronizer Yields Maximum Computation Rate in Distributed Networks (Extended Abstract) (SE, SR), pp. 95–105.
FMVDME-1990-Hall #calculus #object-oriented #specification #using
Using Z as a Specification Calculus for Object-Oriented Systems (AH), pp. 290–318.
FMVDME-1990-Lange #approach #formal method #hypermedia #prototype #specification #using
A Formal Approach to Hypertext using Post-Prototype Formal Specification (DBL), pp. 99–121.
FMVDME-1990-Weber-Wulff #implementation #using
A Buffering System Implementation using VDM (DWW), pp. 135–149.
LISPLFP-1990-Burn #analysis #using
Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
ICGTGG-1990-Bunke #graph grammar #pattern matching #pattern recognition #question #recognition
Graph Grammars — a Useful Tool for Pattern Recognition? (HB), pp. 43–46.
ICGTGG-1990-Gottler #graph grammar
Usefulness of Graph Grammars in Applications (HG), pp. 48–49.
ICGTGG-1990-GottlerGN #design #exclamation #graph grammar
Use Graph Grammars to Design CAD-Systems! (HG, JG, GN), pp. 396–410.
ICGTGG-1990-Paz #graph grammar
Usefulness and Visibility of Graph Grammars (AP), p. 56.
CHICHI-1990-BohringerP #algorithm #automation #constraints #graph #layout #using
Using constraints to achieve stability in automatic graph layout algorithms (KFB, FNP), pp. 43–51.
CHICHI-1990-FischerLMM #using
Using critics to empower users (GF, ACL, TWM, AIM), pp. 337–347.
CHICHI-1990-GongE #approach #design #documentation #evaluation #usability #using
Designing minimal documentation using a GOMS model: a usability evaluation of an engineering approach (RG, JE), pp. 99–107.
CHICHI-1990-LewisPWR #design #interface #testing
Testing a walkthrough methodology for theory-based design of walk-up-and-use interfaces (CHL, PGP, CW, JR), pp. 235–242.
CHICHI-1990-YoungW #analysis #concept #fault #predict #using
Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
CSCWCSCW-1990-Hellman #collaboration
User Support: Illustrating Computer Use in Collaborative Work Contexts (RH), pp. 255–267.
CSCWCSCW-1990-YakemovicC #development #information management
Report on a Development Project Use of an Issue-Based Information System (KCBY, EJC), pp. 105–118.
CAiSECAiSE-1990-WijersD #automation #case study #experience
Experiences with the Use of CASE-Tools in the Netherlands (GMW, HED), pp. 5–20.
ICMLML-1990-ArunkumarY #information management #learning #representation #using
Knowledge Acquisition from Examples using Maximal Representation Learning (SA, SY), pp. 2–8.
ICMLML-1990-Kodratoff #abduction #problem #proving #using
Using Abductive Recovery of Failed Proofs for Problem Solving by Analogy (YK), pp. 295–303.
ICMLML-1990-LairdHYT #using
Correcting and Extending Domain Knowledge using Outside Guidance (JEL, MH, ESY, CMT), pp. 235–243.
ICMLML-1990-McCallumS #algorithm #search-based #using
Using Genetic Algorithms to Learn Disjunctive Rules from Examples (AM, KAS), pp. 149–152.
SEKESEKE-1990-RizmanR #agile #data flow #knowledge-based #prototype #specification #using
Using Data-flow Description Supported By The Rapid Prototyping Tool For Specifying and Developing of Knowledge-Based System (KR, IR), pp. 58–63.
SEKESEKE-1990-YangH #modelling #using
Modeling Software Objects Using Hypergraph (YY, FH), pp. 39–44.
SIGIRSIGIR-1990-CringeanEMW #parallel #using
Parallel Text Searching in Serial Files Using a Processor Farm (JKC, RE, GAM, PW), pp. 429–453.
SIGIRSIGIR-1990-CroftD #documentation #query #retrieval
Experiments with Query Acquisition and Use in Document Retrieval Systems (WBC, RD), pp. 349–368.
SIGIRSIGIR-1990-KimotoI #information retrieval
Construction of a Dynamic Thesaurus and its Use for Associated Information Retrieval (HK, TI), pp. 227–240.
SIGIRSIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using
Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
OOPSLAOOPSLA-ECOOP-1990-LeavensW #object-oriented #reasoning #source code #type system
Reasoning about Object-Oriented Programs that Use Subtypes (GTL, WEW), pp. 212–223.
PPDPALP-1990-DebartEL #equation #logic programming #multi #order #using
Multi-Modal Logic Programming using Equational and Order-Sorted Logic (FD, PE, ML), pp. 55–69.
PPDPPLILP-1990-Ferdinand #functional #model transformation #pattern matching #using
Pattern Matching in a Functional Transformation Language using Treeparsing (CF), pp. 358–371.
PPDPPLILP-1990-Sahlin #fixpoint #prolog #using
Finding the Least Fixed Point Using Wait-Declarations in Prolog (DS), pp. 151–158.
ICSEICSE-1990-Bush90b #case study #experience #quality
Improving Software Quality: The Use of Formal Inspections at the JPL (Experience Report) (MWB), pp. 196–199.
ICSEICSE-1990-DeMarcoG #case study #documentation #experience #video
Use of Video for Program Documentation (Experience Report) (TD, CG), pp. 126–128.
ICSEICSE-1990-Dowson #case study #experience #using
Experience Using the Graphite Meta-Tool (Experience Report) (MD), pp. 192–195.
ICSEICSE-1990-LafontaineLS #case study #development #empirical #formal method #proving #theorem proving #using
An Experiment in Formal Software Development: Using the B Theorem Prover on a VDM Case Study (CL, YL, PYS), pp. 34–42.
ICSEICSE-1990-ZucconiMW #case study #development #experience #object-oriented #prototype #using
Using Object-Oriented Development for Support Prototyping (Experience Report) (LZ, GM, LGW), pp. 129–132.
WAGAWAGA-1990-DelestF #attribute grammar #using
Counting Polyominoes Using Attribute Grammars (MPD, JMF), pp. 46–60.
WAGAWAGA-1990-Rosendahl #abstract interpretation #attribute grammar #using
Abstract Interpretation Using Attribute Grammar (MR), pp. 143–156.
WAGAWAGA-1990-ShinodaK #algorithm #attribute grammar #distributed #evaluation #implementation #object-oriented #using
Object-Oriented Extension of Attribute Grammars and its Implementation Using Distributed Attribute Evaluation Algorithm (YS, TK), pp. 177–191.
WAGAWAGA-1990-Waite #attribute grammar #compilation
Use of Attribute Grammars in Compiler Construction (WMW), pp. 255–265.
CCCC-1990-DesplandMR #generative #named #term rewriting #using
PAGODE: A Back End Generator Using Attribute Abstract Syntaxes and Term Rewritings (AD, MM, RR), pp. 86–105.
CCCC-1990-Larcheveque #compilation #incremental #lalr #parsing #using
Using an LALR Compiler Compiler to Generate Incremental Parsers (JML), pp. 147–164.
CADECADE-1990-Hagiya #higher-order #programming #proving #unification #using
Programming by Example and Proving by Example Using Higher-order Unification (MH), pp. 588–602.
CAVCAV-1990-BryantS #modelling #using #verification
Formal Verification of Digital Circuits Using Symbolic Ternary System Models (REB, CJHS), pp. 33–43.
CAVCAV-1990-CamuratiGPR #model checking
The Use of Model Checking in ATPG for Sequential Circuits (PC, MG, PP, MSR), pp. 86–95.
CAVCAV-1990-Godefroid #automation #partial order #using #verification
Using Partial Orders to Improve Automatic Verification Methods (PG), pp. 176–185.
CAVCAV-1990-JanickiK #graph #reachability #simulation #using
Using Optimal Simulations to Reduce Reachability Graphs (RJ, MK), pp. 166–175.
CAVCAV-1990-LaiPD #on the #protocol #using #verification
On Using Protean To Verify ISO FTAM Protocol (RL, KRP, TSD), pp. 126–135.
CAVCAV-1990-LloretAV #communication #composition #design #petri net #protocol #using #verification
Compositional Design and Verification of Communication Protocols, Using Labelled Petri Nets (JCL, PA, FV), pp. 96–105.
CAVCAV-1990-LoewensteinD #higher-order #logic #multi #protocol #simulation #using #verification
Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic (PL, DLD), pp. 302–311.
CAVCAV-1990-NakamuraKFT #logic #using #verification
A Data Path Verifier for Register Transfer Level Using Temporal Logic Language Tokio (HN, YK, MF, HT), pp. 76–85.
CAVCAV-1990-ProbstL #explosion #partial order #problem #semantics #using
Using Partial-Order Semantics to Avoid the State Explosion Problem in Asynchronous Systems (DKP, HFL), pp. 146–155.
ICLPCLP-1990-Fribourg90 #execution #induction #logic programming #prolog #proving #source code
Extracting Logic Programs from Proofs that Use Extended Prolog Execution and Induction (LF), pp. 685–699.
ICLPCLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict #using
A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
LICSLICS-1990-CleavelandS #proving #specification #using
When is “Partial” Adequate? A Logic-Based Proof Technique Using Partial Specifications (RC, BS), pp. 440–449.
LICSLICS-1990-LarsenX #equation #using
Equation Solving Using Modal Transition Systems (KGL, LX), pp. 108–117.
DACDAC-1989-AudeK #adaptation #design #representation
Representation and Use of Design Rules within a Technology Adaptable CAD System (JSA, HJK), pp. 478–484.
DACDAC-1989-ChengY #difference #fault #memory management #performance #simulation #using
Differential Fault Simulation — a Fast Method Using Minimal Memory (WTC, MLY), pp. 424–428.
DACDAC-1989-ChungC #parallel #simulation #using
Data Parallel Simulation Using Time-Warp on the Connection Machine (MJC, YC), pp. 98–103.
DACDAC-1989-DaveP #generative #testing #using
A Functional-Level Test Generation Methodology Using Two-level Representations (UJD, JHP), pp. 722–725.
DACDAC-1989-GoreR #array #automation #equation #logic #programmable #synthesis #using
Automatic Synthesis of Boolean Equations Using Programmable Array Logic (RG, KR), pp. 283–289.
DACDAC-1989-HedenstiernaJ #design #layout
The Use of Inverse Layout Trees for Hierarchical Design Rule Checking (NH, KOJ), pp. 508–512.
DACDAC-1989-HwangOI #communication #complexity #logic #multi #synthesis #using
Multi-Level Logic Synthesis Using Communication Complexity (TH, RMO, MJI), pp. 215–220.
DACDAC-1989-HwangWF #architecture #configuration management #evaluation #using
Evaluation of a Reconfigurable Architecture for Digital Beamforming Using the OODRA Workbench (DLH, TLW, WKF), pp. 614–617.
DACDAC-1989-LeeHK #fault #generative #testing #using
Test Generation of Stuck-open Faults Using Stuck-at Test Sets in CMOS Combinational Circuits (HKL, DSH, KK), pp. 345–350.
DACDAC-1989-LisG #modelling #synthesis #using
VHDL Synthesis Using Structured Modeling (JL, DG), pp. 606–609.
DACDAC-1989-Muller-GlaserB #approach #design #specification #using
An Approach to Intelligent Assistance for the Specification of ASIC Design Using Objects and Rules (KDMG, JB), pp. 472–477.
DACDAC-1989-RajsumanJM #detection #fault #using
CMOS Stuck-open Fault Detection Using Single Test Patterns (RR, APJ, YKM), pp. 714–717.
DACDAC-1989-RoyA #approach #novel #using #verification
A Novel Approach to Accurate Timing Verification Using RTL Descriptions (KR, JAA), pp. 638–641.
DACDAC-1989-SaldanhaWBS #logic #multi #using
Multi-level Logic Simplification Using Don’t Cares and Filters (AS, ARW, RKB, ALSV), pp. 277–282.
DACDAC-1989-SaucierDP #using
State Assignment Using a New Embedding Method Based on an Intersecting Cube Theory (GS, CD, FP), pp. 321–326.
DACDAC-1989-WinslettKHW #coordination #design
Use of Change Coordination in an Information-rich Design Environment (MW, DWK, KH, GW), pp. 252–257.
HTHT-1989-CrouchCA #clustering #hypermedia #information retrieval
The Use of Cluster Hierarchies in Hypertext Information Retrieval (DBC, CJC, GA), pp. 225–237.
HTHT-1989-YoderW #hypermedia #using
Using Hypertext in a Law Firm (EAY, TCW), pp. 159–167.
PODSPODS-1989-FaloutsosM #clustering #fault #using
Declustering Using Error Correcting Codes (CF, DNM), pp. 253–258.
VLDBVLDB-1989-Motro #constraints #query #relational #using
Using Integrity Constraints to Provide Intensional Answers to Relational Queries (AM), pp. 237–246.
CSEETSEI-1989-Tomayko #education #maintenance #scalability #using
Teaching Maintenance Using Large Software Artifacts (JET), pp. 3–15.
CSEETSEI-1989-WerthW #education #object-oriented #programming #using
Teaching Object-Oriented Programming Using the Macintosh MPW/MacApp Environment (LHW, JW), pp. 141–155.
CSEETSEI-1989-ZwebenSB #testing
Exploratory Studies of the Software Testing Methods Used by Novice Programmers (SHZ, CS, RB), pp. 169–188.
PLDIPLDI-1989-BalasundaramK #data access #parallel
A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
PLDIPLDI-1989-ChiD #liveness #using
Unified Management of Registers and Cache Using Liveness and Cache Bypass (CHC, HGD), pp. 344–355.
STOCSTOC-1989-HastadLN #performance #using
Fast Computation Using Faulty Hypercubes (Extended Abstract) (JH, FTL, MN), pp. 251–263.
STOCSTOC-1989-RivestS #automaton #finite #sequence #using
Inference of Finite Automata Using Homing Sequences (Extended Abstract) (RLR, RES), pp. 411–420.
FPCAFPCA-1989-Rittri #library #using
Using Types as Search Keys in Function Libraries (MR), pp. 174–183.
CHICHI-1989-BrownNG #empirical #visual notation
An experiment into the use of auditory cues to reduce visual workload (MLB, SLN, EPG), pp. 339–346.
CHICHI-1989-CohenDMPSGST #natural language
Synergistic use of direct manipulation and natural language (PRC, MD, DBM, FCNP, JWS, RAGJ, JLS, SWT), pp. 227–233.
CHICHI-1989-IwaiDYFT #architecture #automation #documentation #layout #using
A document layout system using automatic document architecture extraction (II, MD, KY, MF, YT), pp. 369–374.
CHICHI-1989-MackayMCRRC #how #lens #question
How do experienced information lens users use rules? (WEM, TWM, KC, RR, DR, SKC), pp. 211–216.
CHICHI-1989-WareB #parametricity
Bat brushes: on the uses of six position and orientation parameters in a paint program (CW, CB), pp. 155–160.
CAiSECAiSE-1989-HernbackL #analysis #automation #classification #framework #implementation #tool support
A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
CAiSECAiSE-1989-LaenensSSV #case study #design #knowledge base #object-oriented #using
A Case Study in Object-Oriented Knowledge-Base Design Using the KIWI System (EL, JS, FS, DV).
CAiSECAiSE-1989-McDaniel #information management #using
Using PSL/PSA to Model Information System Planning for The United States Department of the Army Headquarters (PDM).
CAiSECAiSE-1989-Swende #architecture #data-driven #named #resource management
IRMA — Information Resource Management Architecture: A Data-driven Method Used in Planning the Overall System Architecture (ES).
KRKR-1989-RossiM #constraints #linear #network #using
Exact Solution in Linear Time of Networks of Constraints Using Perfect Relaxation (FR, UM), pp. 394–399.
ICMLML-1989-AllenL #concept #using
Using Concept Hierarchies to Organize Plan Knowledge (JAA, PL), pp. 229–231.
ICMLML-1989-Buntine #classification #learning #using
Learning Classification Rules Using Bayes (WLB), pp. 94–98.
ICMLML-1989-CaruanaSE #algorithm #bias #induction #multi #search-based #using
Using Multiple Representations to Improve Inductive Bias: Gray and Binary Coding for Genetic Algorithms (RC, JDS, LJE), pp. 375–378.
ICMLML-1989-FriedrichN #algorithm #induction #learning #using
Using Domain Knowledge to Improve Inductive Learning Algorithms for Diagnosis (GF, WN), pp. 75–77.
ICMLML-1989-Jones #learning #problem
Learning to Retrieve Useful Information for Problem Solving (RMJ), pp. 212–214.
ICMLML-1989-Mahadevan #problem #using
Using Determinations in EBL: A Solution to the incomplete Theory Problem (SM), pp. 320–325.
ICMLML-1989-Rose #using
Using Domain Knowledge to Aid Scientific Theory Revision (DR), pp. 272–277.
ICMLML-1989-Seifert #feature model #retrieval #using
A Retrieval Model Using Feature Selection (CMS), pp. 52–54.
ICMLML-1989-SobekL #learning #using
Using Learning to Recover Side-Effects of Operators in Robotics (RPS, JPL), pp. 205–208.
ICMLML-1989-Tadepalli #approximate
Planning Approximate Plans for Use in the Real World (PT), pp. 224–228.
ICMLML-1989-TanS #approach #concept #learning #recognition
Cost-Sensitive Concept Learning of Sensor Use in Approach ad Recognition (MT, JCS), pp. 392–395.
SEKESEKE-1989-Czejdo #database #query #recursion #specification #using
Recursive Query Specification Using Nested Databases (BDC), pp. 140–145.
SIGIRSIGIR-1989-Belew #adaptation #documentation #information retrieval #representation #using
Adaptive Information Retrieval: Using a Connectionist Representation to Retrieve and Learn About Documents (RKB), pp. 11–20.
SIGIRSIGIR-1989-CampagnoniE #information retrieval #using
Information Retrieval Using a Hypertext-Based Help System (FRC, KE), pp. 212–220.
SIGIRSIGIR-1989-KrovetzC #ambiguity #using #word
Word Sense Disambiguation Using Machine-Readable Dictionaries (RK, WBC), pp. 127–136.
SIGIRSIGIR-1989-Kwasnik #classification #documentation #how
How a Personal Document’s Intended Use or Purpose Affects its Classification in an Office (BHK), pp. 207–210.
SIGIRSIGIR-1989-RaghavanBJ #evaluation #precise #problem #retrieval #using
Retrieval System Evaluation Using Recall and Precision: Problems and Answers (VVR, PB, GSJ), pp. 59–68.
ECOOPECOOP-1989-MullerP #object-oriented #programming #rest
Four Steps and a Rest in Putting an Object-Oriented Programming Environment to Practical Use (GM, AKP), pp. 271–282.
OOPSLAOOPSLA-1989-HarrisonSS #development #experience #object-oriented #paradigm #using
Good News, Bad News: Experience Building a Software Development Environment Using the Object-Oriented Paradigm (WHH, JJS, PFS), pp. 85–94.
OOPSLAOOPSLA-1989-Jerrell #automation #c++ #difference #using
Function Minimization and Automatic Differentiation Using C++ (MEJ), pp. 169–173.
OOPSLAOOPSLA-1989-MullerRKS #interface #multi
The Use of Multimethods and Method Combination in a CLOS Based Window System Interface (HM, JRR, JK, TS), pp. 239–253.
OOPSLAOOPSLA-1989-RussoC #design #memory management #multi #object-oriented #operating system #using
Virtual Memory and Backing Storage Management in Multiprocessor Operating Systems Using Object-Oriented Design Techniques (VFR, RHC), pp. 267–278.
ESECESEC-1989-FranceD #analysis #specification #using
Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
ESECESEC-1989-MorascaP #ada #concurrent #execution #source code #symbolic computation #using #validation
Validation of Concurrent ADA Programs using Symbolic Execution (SM, MP), pp. 469–486.
ESECESEC-1989-Shutt #development #program analysis #specification #tool support #using
A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
ASPLOSASPLOS-1989-Karger #performance #using
Using Registers to Optimize Cross-Domain Call Performance (PAK), pp. 194–204.
CSLCSL-1989-PrieseN #metric #semantics #using
Semantic for Abstract Fairness using Metric Spaces (LP, DN), pp. 355–368.
ICLPNACLP-1989-InamuraIRN #evaluation #multi #optimisation #using
Optimizing Techniques Using the MRB and Their Evaluation on the Multi-PSI/V2 (YI, NI, KR, KN), pp. 907–921.
ICLPNACLP-1989-SataluriF #logic programming #semantics #source code #specification #using
Semantic Specification Using Logic Programs (SRS, ACF), pp. 772–791.
ISSTATAV-1989-KotikM #analysis #automation #program transformation #testing #using
Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
DACDAC-1988-AugustinGHLS #design #using #verification
Verification of VHDL Designs Using VAL (LMA, BAG, YH, DCL, AGS), pp. 48–53.
DACDAC-1988-BeattyB #analysis #incremental #performance #using
Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
DACDAC-1988-GaedeRMB #automation #concurrent #named #parallel #testing #using
CATAPULT: Concurrent Automatic Testing Allowing Parallelization and Using Limited Topology (RKG, DER, MRM, KMB), pp. 597–600.
DACDAC-1988-KimTH #automation #hardware #using
Automatic Insertion of BIST Hardware Using VHDL (KK, JGT, DSH), pp. 9–15.
DACDAC-1988-MadreB #behaviour #comparison #correctness #proving #using
Proving Circuit Correctness Using Formal Comparison Between Expected and Extracted Behaviour (JCM, JPB), pp. 205–210.
DACDAC-1988-MaoC #algorithm #generative #metric #named #self #testing #using
Dytest: A Self-Learning Algorithm Using Dynamic Testability Measures to Accelerate Test Generation (WM, MDC), pp. 591–596.
DACDAC-1988-Razouk #modelling #petri net #pipes and filters
The Use of Petri Nets for Modeling Pipelined Processors (RRR), pp. 548–553.
DACDAC-1988-SaitohINKMHHK #logic #simulation #using
Logic Simulation System Using Simulation Processor (SP) (MS, KI, AN, MK, JM, HH, FH, NK), pp. 225–230.
DACDAC-1988-Sechen #metaprogramming #using
Chip-Planning, Placement, and Global Routing of Macro/Custom Cell Integrated Circuits Using Simulated Annealing (CS), pp. 73–80.
DACDAC-1988-StarkH #network #power management #using
Analyzing CMOS Power Supply Networks Using Ariel (DS, MH), pp. 460–464.
PODSPODS-1988-ParedaensG #algebra #using
Possibilities and Limitations of Using Flat Operators in Nested Algebra Expressions (JP, DVG), pp. 29–38.
SIGMODSIGMOD-1988-MazumdarSS #proving #security #theorem proving #using
Resolving the Tension between Integrity and Security Using a Theorem Prover (SM, DWS, TS), pp. 233–242.
VLDBVLDB-1988-NakayamaK #using
Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
CSEETSEI-1988-ChandhokG #ada
Ada Edu Project: Supporting the Use of Ada in Introductory Computer Science (RC, TAG), pp. 199–207.
PLDIPLDI-1988-HorwitzRB #dependence #graph #interprocedural #slicing #using
Interprocedural Slicing Using Dependence Graphs (SH, TWR, DB), pp. 35–46.
PLDIPLDI-1988-Rose #design #type system
Refined Types: Highly Differentiated Type Systems and Their Use in the Design of Intermediate Langages (JRR), pp. 278–287.
STOCSTOC-1988-AdlemanK #parallel #using
Using Smoothness to Achieve Parallelism (Abstract) (LMA, KK), pp. 528–538.
STOCSTOC-1988-Ben-OrC #algebra #constant #using
Computing Algebraic Formulas Using a Constant Number of Registers (MBO, RC), pp. 254–257.
PLDIBest-of-PLDI-1988-HorwitzRB88a #dependence #graph #interprocedural #slicing #using
Interprocedural slicing using dependence graphs (with retrospective) (SH, TWR, DB), pp. 229–243.
FMVDME-1988-Boddy
The Use of VDM within the Alvey Flagship Project (GB), pp. 153–166.
FMVDME-1988-ButhB #code generation #correctness #proving #specification #term rewriting #using
Correctness Proofs for Meta IV Written Code Generator Specification using Term Rewriting (BB, KHB), pp. 406–433.
FMVDME-1988-Scullard #testing #using
Test Case Selection using VDM (GTS), pp. 178–186.
FMVDME-1988-TeoA #specification
The Use of VDM in the Specification of Chinese Characters (GST, MMaA), pp. 476–499.
FMVDME-1988-WoodcockD #case study #experience #using
Using VDM with Rely and Guarantee-Conditions — Experiences from a Real Project (JW, BD), pp. 434–458.
LISPLFP-1988-Norman #combinator #hardware #performance #reduction #using
Faster Combinator Reduction Using stock Hardware (ACN), pp. 235–243.
CSCWCSCW-1988-Bly #collaboration
A Use of Drawing Surfaces in Different Collaborative Settings (SAB), pp. 250–256.
CSCWCSCW-1988-LelandFK #collaboration #documentation #using
Collaborative Document Production Using Quilt (MDPL, RSF, REK), pp. 206–215.
CSCWCSCW-1988-Mackay #communication #email
More than just a Communication System: Diversity in the Use of Electronic Mail (WEM), pp. 344–353.
CSCWCSCW-1988-SingerBR #collaboration
Children’s Collaborative Use of a Computer Microworld (JS, SDB, JR), pp. 271–281.
ICMLML-1988-Gross #concept #incremental #learning #multi #using
Incremental Multiple Concept Learning Using Experiments (KPG), pp. 65–72.
ICMLML-1988-JongS #game studies #learning #using
Using Experience-Based Learning in Game Playing (KADJ, ACS), pp. 284–290.
ICMLML-1988-Kerber #using
Using a Generalization Hierarchy to Learn from Examples (RK), pp. 1–7.
ICMLML-1988-Mel #modelling #using
Building and Using Mental Models in a Sensory-Motor Domain (BWM), pp. 207–213.
ICMLML-1988-TanE #classification #network #using
Using Weighted Networks to Represent Classification Knowledge in Noisy Domains (MT, LJE), pp. 121–134.
SIGIRSIGIR-1988-BonziL #documentation #information retrieval
The Use of Anaphoric Resolution for Document Description in Information Retrieval (SB, EDL), pp. 53–66.
SIGIRSIGIR-1988-Case #comprehension #how #retrieval #scalability
How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
SIGIRSIGIR-1988-FurnasDDLHSL #composition #information retrieval #semantics #using
Information Retrieval using a Singular Value Decomposition Model of Latent Semantic Structure (GWF, SCD, STD, TKL, RAH, LAS, KEL), pp. 465–480.
SIGIRSIGIR-1988-HirabayashiMK #documentation #information retrieval #using
Information Retrieval using Impression of Documents as a Clue (FH, HM, YK), pp. 233–244.
SIGIRSIGIR-1988-Pevzner #database #how #why
Precedental Data Bases: How and Why They are Worked Out and Used (BP), pp. 117–125.
SIGIRSIGIR-1988-SaltonB #automation #information retrieval #on the
On the Use of Spreading Activation Methods in Automatic Information Retrieval (GS, CB), pp. 147–160.
ECOOPECOOP-1988-DoiKH #concurrent #implementation #kernel #object-oriented #operating system #using
An Implementation of an Operating System Kernel Using Concurrent Object-Oriented Language ABCL/c+ (ND, YK, KH), pp. 250–266.
ECOOPECOOP-1988-Pasquier-BoltuckGC #approach #interactive #object-oriented #prototype #using
Prototyping an Interactive Electronic Book System Using an Object-Oriented Approach (JPB, EG, GC), pp. 177–190.
OOPSLAOOPSLA-1988-DuhlD #benchmark #comparison #database #metric #performance #relational #using
A Performance Comparison of Object and Relational Databases Using the Sun Benchmark (JD, CD), pp. 153–163.
OOPSLAOOPSLA-1988-KleynG #comprehension #named #object-oriented #using
GraphTrace — Understanding Object-Oriented Systems Using Concurrently Animated Views (MFK, PCG), pp. 191–205.
OOPSLAOOPSLA-1988-MatsuokaK #communication #distributed #object-oriented #tuple #using
Using Tuple Space Communication in Distributed Object-Oriented Languages (SM, SK), pp. 276–284.
OOPSLAOOPSLA-1988-Rumbaugh #using
Controlling Propagation of Operations Using Attributes on Relations (JER), pp. 285–296.
PPDPPLILP-1988-AsirelliI #database #development #logic #using
Using Logic Databases in Software Development Environments (PA, PI), pp. 292–299.
PPDPPLILP-1988-Dang #definite clause grammar #interactive #specification #using
Formal Specification of Interactive Languages Using Definite Clause Grammars (WD), pp. 283–291.
PPDPPLILP-1988-RiedewaldL #attribute grammar #logic programming #using
Using an Attribute Grammar as a Logic Program (GR, UL), pp. 161–179.
ICSEICSE-1988-ChaLS #analysis #fault #safety #using #verification
Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
ICSEICSE-1988-EvangelistSFG #design #distributed #using
Using Raddle To Design Distributed Systems (ME, VYS, IRF, MG), pp. 102–115.
ICSEICSE-1988-NakagawaFTS #algebra #specification #using
Algebraic Specification of Macintosh’s Quickdraw Using OBJ2 (ATN, KF, ST, TS), pp. 334–343.
ICSEICSE-1988-Sharp #automation #design #evaluation #named #refinement #using
KDA — A Tool for Automatic Design Evaluation and Refinement Using the Blackboard Model of Control (HCS), pp. 407–417.
PPoPPPPEALS-1988-Katseff #assembly #clustering #parallel #using
Using Data Partitioning to Implement a Parallel Assembler (HPK), pp. 66–76.
CADECADE-1988-Bundy #induction #proving
The Use of Explicit Plans to Guide Inductive Proofs (AB), pp. 111–120.
CADECADE-1988-DonatW #higher-order #learning #using
Learning and Applying Generalised Solutions using Higher Order Resolution (MRD, LAW), pp. 41–60.
CADECADE-1988-ZhangK #first-order #proving #theorem proving #using
First-Order Theorem Proving Using Conditional Rewrite Rules (HZ, DK), pp. 1–20.
CSLCSL-1988-SaakeL #database #logic #specification #using
Using Finite-Linear Temporal Logic for Specifying Database Dynamics (GS, UWL), pp. 288–300.
ICLPJICSCP-1988-HannanM88 #higher-order #implementation #unification
Uses of Higher-Order Unification for Implementing Program Transformers (JH, DM), pp. 942–959.
ICLPJICSCP-1988-McCroskyK88 #array #prolog #using
Improving First-Class Array Expressions Using Prolog (CM, AJK), pp. 18–25.
DACDAC-1987-ChangCH #approach #automation #generative #layout #matrix #using
Automated Layout Generation Using Gate Matrix Approach (YCC, SCC, LHH), pp. 552–558.
DACDAC-1987-Grover #standard #using
Standard Cell Placement Using Simulated Sintering (LKG), pp. 56–59.
DACDAC-1987-KlingB #evolution #named #standard #using
ESP: A New Standard Cell Placement Package Using Simulated Evolution (RMK, PB), pp. 60–66.
DACDAC-1987-YuKL #adaptation #optimisation #testing #using
VLSI Circuit Testing Using an Adaptive Optimization Model (PSY, CMK, YHL), pp. 399–406.
HTHT-1987-Marshall #hypermedia #problem #representation #using
Exploring Representation Problems Using Hypertext (CCM), pp. 253–268.
VLDBVLDB-1987-SiebesK #axiom #database #design #semantics #using
Using Design Axioms and Topology to Model Database Semantics (AS, MLK), pp. 51–59.
STOCSTOC-1987-Vazirani #performance #using
Efficiency Considerations in Using Semi-random Sources (Extended Abstract) (UVV), pp. 160–168.
ICALPICALP-1987-LarsenM #bisimulation #protocol #using #verification
Verifying a Protocol Using Relativized Bisimulation (KGL, RM), pp. 126–135.
FMVDME-1987-ChedgeyKK #ada #development #object-oriented #using
Using VDM in an Object-Oriented Development Method for Ada Software (CC, SK, HJK), pp. 63–76.
FMVDME-1987-Crispin #experience #using
Experience Using VDM in STC (RJC), pp. 19–32.
FMVDME-1987-HaffO
Use of VDM within CCITT (PH, AO), pp. 324–330.
FMVDME-1987-Jones87b #data flow #semantics #using
A Formal Semantics for a DataFlow Machine — Using VDM (KDJ), pp. 331–355.
FMVDME-1987-MinkowitzH #object-oriented #programming #using
A Formal Description of Object-Oriented Programming Using VDM (CM, PBH), pp. 237–259.
FPCAFPCA-1987-Clarke #architecture #multi
The D-RISC: An architecture for use in multiprocessors (TJWC), pp. 16–33.
HCIHCI-CE-1987-Fischer
Making Computers More Useful and More Usable (GF), pp. 97–104.
HCIHCI-CE-1987-Moser #comprehension #debugging #design #using #visual notation
Understanding Complex Software Systems Using GADD: A Tool for Graphical Animated Design and Debugging (MCM), pp. 449–456.
HCIHCI-CE-1987-Ruggles #design
Enhancing a Traditional Typeface Design Environment Through the Use of Contemporary Computing Technology (LR), pp. 481–488.
HCIHCI-SES-1987-Bradley #industrial #using
Changing Roles in an Electronic Industry: Engineers Using CAD System and Secretaries Using work-Processing System (GB), pp. 295–302.
SIGIRSIGIR-1987-Borgman #difference #information retrieval
Individual Differences in the Use of Information Retrieval Systems: Some Issues and Some Data (CLB), pp. 61–71.
SIGIRSIGIR-1987-OommenM #automaton #clustering #learning #performance #probability #using
Fast Object Partitioning Using Stochastic Learning Automata (BJO, DCYM), pp. 111–122.
SIGIRSIGIR-1987-RasmussenW #array #clustering #distributed #documentation #using
Non-Hierarchic Document Clustering Using the ICL Distributed Array Processor (EMR, PW), pp. 132–139.
SIGIRSIGIR-1987-TongAAC #concept #information retrieval #using
Conceptual Information Retrieval Using RUBRIC (RMT, LAA, VNA, JFC), pp. 247–253.
ECOOPECOOP-1987-HalbertO #inheritance #object-oriented #using
Using Types and Inheritance in Object-Oriented Languages (DCH, PDO), pp. 20–31.
OOPSLAOOPSLA-1987-BarryATW #design #using
Using Objects To Design and Build Radar ESM Systems (BMB, JRA, DAT, MW), pp. 192–201.
OOPSLAOOPSLA-1987-KerrP #analysis #object-oriented #programming
Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
ESECESEC-1987-GarzottoGMM #logic programming #on the #realtime #specification #using
On the Specification of Real-Time Systems Using Logic Programming (FG, CG, DM, AM), pp. 180–190.
ESECESEC-1987-Szwillus #data flow #editing #interactive #operating system #specification #user interface #using
Using Data Flow Specifications and Interactive Editing in the Operating System User Interface (GS), pp. 149–157.
ICSEICSE-1987-Bjorner #development #formal method #on the
On the Use of Formal Methods in Software Development (DB), pp. 17–29.
ICSEICSE-1987-LubarsH #design #knowledge-based #using
Knowledge-Based Software Design Using Design Schemas (MDL, MTH), pp. 253–262.
ICSEICSE-1987-MiyazakiM #metric #using
Software Metrics Using Deviation Value (YM, NM), pp. 83–95.
ICSEICSE-1987-Nomura #re-engineering #tool support
Use of Software Engineering Tools in Japan (TN), pp. 263–269.
ASPLOSASPLOS-1987-WallP #experience #using
The Mahler Experience: Using and Intermediate Language as the Machine Description (DWW, MLP), pp. 100–104.
SOSPSOSP-1987-Hagmann #commit #file system #using
Reimplementing the Cedar File System Using Logging and Group Commit (RBH), pp. 155–162.
SOSPSOSP-1987-Nichols #using
Using Idle Workstations in a Shared Computing Environment (DAN), pp. 5–12.
CSLCSL-1987-HeiselRS #logic #using #verification
Program Verification Using Dynamic Logic (MH, WR, WS), pp. 102–117.
LICSLICS-1987-GallierRS #equation #proving #theorem proving #using
Theorem Proving Using Rigid E-Unification Equational Matings (JHG, SR, WS), pp. 338–346.
LICSLICS-1987-Milner #fixpoint
Some Uses of Maximal Fixed Points (Abstract of Invited Lecture) (RM), p. 3.
DACDAC-1986-BapatV #logic #reasoning #using
Reasoning about digital systems using temporal logic (SB, GV), pp. 215–219.
DACDAC-1986-BushnellD #integration #tool support #using
VLSI CAD tool integration using the Ulysses environment (MLB, SWD), pp. 55–61.
DACDAC-1986-Gonzalez-SustaetaB #automation #concept #database #design #using
An automated database design tool using the ELKA conceptual model (JGS, APB), pp. 752–759.
DACDAC-1986-LadjadjMHM #array #testing
Use of the subscripted DALG in submodule testing with applications in cellular arrays (ML, JFM, DHH, WM), pp. 346–353.
DACDAC-1986-LigthartAB #statistics #using
Design-for-testability of PLA’s using statistical cooling (MML, EHLA, FPMB), pp. 339–345.
DACDAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis #using
Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
DACDAC-1986-PincusD #reduction #using
Delay reduction using simulated annealing (JDP, AMD), pp. 690–695.
DACDAC-1986-Sasao #generative #multi #named #synthesis #using
MACDAS: multi-level AND-OR circuit synthesis using two-variable function generators (TS), pp. 86–93.
PODSPODS-1986-Robinson #linear #order #statistics #using
Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
SIGMODSIGMOD-1986-Faloutsos #multi #using
Multiattribute Hashing Using Gray Codes (CF), pp. 227–238.
SIGMODSIGMOD-1986-HarandiSC #using
Rule Base Management Using Meta Knowledge (MTH, TS, SC), pp. 261–267.
VLDBVLDB-1986-ChakravarthyM #database #deduction #graph #multi #query #using
Multiple Query Processing in Deductive Databases using Query Graphs (USC, JM), pp. 384–391.
VLDBVLDB-1986-CheineyFMT #clustering #multi #reliability #using
A Reliable Backend Using Multiattribute Clustering and Select-Join Operator (JPC, PF, RM, JMT), pp. 220–227.
VLDBVLDB-1986-SarinKS #database #process #using
Using History Information to Process Delayed Database Updates (SKS, CWK, JES), pp. 71–78.
LISPLFP-1986-LeeP #implementation #lisp #on the #semantics
On the Use of LISP in Implementing Denotational Semantics (PL, UFP), pp. 233–248.
ICGTGG-1986-Courcelle #algebra #graph #graph grammar #representation #term rewriting
A representation of graphs by algebraic expressions and its use for graph rewriting systems (BC), pp. 112–132.
ICGTGG-1986-MoldovanP #analysis #graph grammar #parallel #rule-based #using
Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
CSCWCSCW-1986-JohnsonWODM #collaboration #empirical #using
Using a computer-based tool to support collaboration: a field experiment (BJ, GW, MHO, RD, GM), pp. 343–352.
CSCWCSCW-1986-KraemerK #development #problem
Computer-based systems for cooperative work and group decisionmaking: status of use and problems in development (KLK, JLK), pp. 353–375.
CSCWCSCW-1986-MaloneGLRR #coordination
Semi-structured messages are surprisingly useful for computer-supported coordination (TWM, KRG, KYL, RR, DR), pp. 102–114.
SIGIRSIGIR-1986-BelkinK #documentation #retrieval #using
Using Structural Representations of Anomalous States of Knowledge for Choosing Document Retrieval Strategies (NJB, BHK), pp. 11–22.
SIGIRSIGIR-1986-El-HamdouchiW #clustering #documentation #using
Hierarchic Document Clustering Using Ward’s Method (AEH, PW), pp. 149–156.
SIGIRSIGIR-1986-TeuholaR #predict #using
Text Compression Using Prediction (JT, TR), pp. 97–102.
SIGIRSIGIR-1986-Zarri #database #relational #retrieval #scalability
The Use of Inference Mechanisms to Improve the Retrieval Facilities from Large Relational Databases (GPZ), pp. 221–227.
OOPSLAOOPSLA-1986-Lieberman #behaviour #object-oriented #prototype #using
Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems (HL), pp. 214–223.
POPLPOPL-1986-JonesM #analysis #data flow #graph #source code #using
Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
POPLPOPL-1986-MacQueen #composition #dependent type #using
Using Dependent Types to Express Modular Structure (DBM), pp. 277–286.
CADECADE-1986-DickC #automation #empirical #equation #reasoning #using
Using Narrowing to do Isolation in Symbolic Equation Solving — An Experiment in Automated Reasoning (AJJD, JC), pp. 272–280.
CADECADE-1986-Hussmann #algebra #prototype #specification #using
The Passau RAP System: Prototyping Algebraic Specifications Using Conditional Narrowing (HH), pp. 689–690.
CADECADE-1986-KapurNZ #induction #proving #testing #using
Proof by Induction Using Test Sets (DK, PN, HZ), pp. 99–117.
CADECADE-1986-Plaisted86a #abstraction #using
Abstraction Using Generalization Functions (DAP), pp. 365–376.
ICLPICLP-1986-GoebelFP86 #approach #constraints #reasoning #using
Using Definite Clauses and Integrity Constraints as the Basis for a Theory Formation Approach to Diagnostic Reasoning (RG, KF, DP), pp. 211–222.
ICLPICLP-1986-KanamoriS86 #execution #prolog #source code #using #verification
Verification of Prolog Programs Using an Extension of Execution (TK, HS), pp. 475–489.
ICLPICLP-1986-RawlingsTNFS86 #prolog #using
Using Prolog to Represent and Reason about Protein Structure (CJR, WRT, JN, JF, MJES), pp. 536–543.
LICSLICS-1986-Browne #algorithm #automation #finite #logic #using #verification
An Improved Algorithm for the Automatic Verification of Finite State Systems Using Temporal Logic (MCB), pp. 260–266.
LICSLICS-1986-Plaisted #nondeterminism #recursion #semantics #source code #using
The Denotional Semantics of Nondeterministic Recursive Programs using Coherent Relations (DAP), pp. 163–174.
ICLPSLP-1986-Gelder86 #logic programming #source code #using
Negation as Failure Using Tight Derivations for General Logic Programs (AVG), pp. 127–138.
DACDAC-1985-AshokCS #data flow #modelling #simulation #using
Modeling switch-level simulation using data flow (VA, RLC, PS), pp. 637–644.
DACDAC-1985-Blanks #polynomial #using
Near-optimal placement using a quadratic objective function (JPB), pp. 609–615.
DACDAC-1985-Bryant #representation #using #visual notation
Symbolic manipulation of Boolean functions using a graphical representation (REB), pp. 688–694.
DACDAC-1985-Frank #data-driven #simulation #using
Switch-level simulation of VLSI using a special-purpose data-driven computer (EHF), pp. 735–738.
DACDAC-1985-HillFL #effectiveness #generative #grid
Effective use of virtual grid compaction in macro-module generators (DDH, JPF, MDPL), pp. 777–780.
DACDAC-1985-TygarE #comparison #performance #using
Efficient netlist comparison using hierarchy and randomization (JDT, RE), pp. 702–708.
SIGMODSIGMOD-1985-Christodoulakis #architecture #documentation #using
Issues in the Architecture of a Document Archiver using Optical Disk Technology (SC), pp. 34–50.
SIGMODSIGMOD-1985-EickL #database #design #using
Acquisition of Terminological Knowledge Using Database Design Techniques (CFE, PCL), pp. 84–94.
SIGMODSIGMOD-1985-RoussopoulosL #database #using
Direct Spatial Search on Pictorial Databases Using Packed R-Trees (NR, DL), pp. 17–31.
SIGMODSIGMOD-1985-ShinI #approach #clustering #database #knowledge-based #relational #using
Partitioning a Relational Database Horizontally Using a Knowledge-Based Approach (DGS, KBI), pp. 95–105.
VLDBVLDB-1985-MondR #concurrent #database #using
Concurrency Control in B+-Trees Databases Using Preparatory Operations (YM, YR), pp. 331–334.
ICALPICALP-1985-SippuS #algorithm #design #on the #performance #relational
On the Use of Relational Expressions in the Design of Efficient Algorithms (Extended Abstract) (SS, ESS), pp. 456–464.
ICALPICALP-1985-VarmanR #array #matrix #multi #on the #using
On Matrix Multiplication Using Array Processors (PJV, IVR), pp. 487–496.
FPCAFPCA-1985-Sheeran85 #architecture #array #design #higher-order #using
Designing Regular Array Architectures using Higher Order Functions (MS), pp. 220–237.
ICSEICSE-1985-BasiliS #metric #set
Calculation and Use of an Environment’s Characteristic Software Metric Set (VRB, RWS), pp. 386–393.
ICSEICSE-1985-BrunoM #agile #petri net #prototype #using
Rapid Prototyping of Control Systems Using High Level Petri Nets (GB, GM), pp. 230–237.
ICSEICSE-1985-GirgisW #analysis #data flow #testing #using
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
ICSEICSE-1985-HorowitzW #documentation #named
SODOS — A Software Documentation Support Environment: Its Use (EH, RW), pp. 8–14.
ICSEICSE-1985-KafuraC #metric #using #validation
A Validation of Software Metrics Using Many Metrics and Two Resources (DGK, JC), pp. 378–385.
ICSEICSE-1985-PeschSSS #generative #prolog #testing #using
Test Case Generation Using Prolog (HP, PS, HS, APS), pp. 252–258.
ICSEICSE-1985-RamseyB #process #testing #using
Analyzing the Test Process Using Structural Coverage (JR, VRB), pp. 306–312.
ICSEICSE-1985-Schaul #bibliography #design #education #re-engineering #using
Design Using Software Engineering Principles: Overview of an Educational Program (MS), pp. 201–209.
SOSPSOSP-1985-Clark #using
The Structuring of Systems Using Upcalls (DDC), pp. 171–180.
DACDAC-1984-Blanks #array #using
Initial placement of gate arrays using least-squares methods (JPB), pp. 670–671.
DACDAC-1984-DunlopADJKW #layout #optimisation #using
Chip layout optimization using critical path weighting (AED, VDA, DND, MFJ, PK, MW), pp. 133–136.
DACDAC-1984-HorstmannS #design #logic programming #using
Computer aided design (CAD) using logic programming (PWH, EPS), pp. 144–151.
DACDAC-1984-KozminskiK #algorithm #graph
An algorithm for finding a rectangular dual of a planar graph for use in area planning for VLSI integrated circuits (KK, EK), pp. 655–656.
DACDAC-1984-SaucierB #control flow #using
VLSI test expertise system using a control flow model (GS, CB), pp. 497–503.
PODSPODS-1984-BuckleyS #concurrent #graph #protocol #using
Concurrency Control in Graph Protocols by Using Edge Locks (GNB, AS), pp. 45–50.
PODSPODS-1984-Garcia-MolinaPD #database #distributed #question
Is Byzantine Agreement Useful in a Distributed Database? (HGM, FMP, SBD), pp. 61–69.
PODSPODS-1984-HwangDG #multi #process #query #using
Using Semiouterjoins to Process Queries in Multidatabase Systems (HYH, UD, MGG), pp. 153–162.
SIGMODSIGMOD-1984-Chang #database #design #distributed #network #using
Simplifying Distributed Database Systems Design by Using a Broadcast Network (JMC), pp. 223–233.
SIGMODSIGMOD-1984-Fedorowicz #database #evaluation #multi #using
Database Evaluation Using Multiple Regression Techniques (JF), pp. 70–76.
SIGMODSIGMOD-1984-Salton #information retrieval #logic
The Use of Extended Boolean Logic in Information Retrieval (GS), pp. 277–285.
SIGMODSIGMOD-1984-ValduriezV #multi #using
A Multikey Hashing Scheme Using Predicate Trees (PV, YV), pp. 107–114.
SIGMODSIGMOD-1984-Willard #calculus #performance #query #relational #using
Efficient Processing of Relational Calculus Expressions Using Range Query Theory (DEW), pp. 164–175.
VLDBVLDB-1984-Ward #using
Name-Tracing Using the ICL Content Addressable Filestore (AGW), pp. 523–528.
PLDISCC-1984-ChristopherHK #code generation #programming #using
Using dynamic programming to generate optimized code in a Graham-Glanville style code generator (TWC, PJH, RCK), pp. 25–36.
PLDISCC-1984-Pleban #compilation #prototype #semantics #using
Compiler prototyping using formal semantics (UFP), pp. 94–105.
SIGIRSIGIR-1984-CroftT #adaptation #documentation #retrieval
The Use of Adaptive Mechanisms for Selection of Search Strategies in Document Retrieval Systems (WBC, RT), pp. 95–110.
POPLPOPL-1984-Sherman #abstraction #named #novel
Paragon: Novel Uses of Type Hierarchies for Data Abstraction (MS), pp. 208–217.
ICSEICSE-1984-AzemaJSM #distributed #petri net #prolog #specification #using #verification
Specification and Verification of Distributed Systems Using PROLOG Interpreded Petri Nets (PA, GJ, ES, MM), pp. 510–519.
ICSEICSE-1984-DuncanHBCFKMMS #ada #communication #design #using
Communication System Design Using Ada (AGD, JSH, JWB, TMC, AF, EK, TM, DM, SBS), pp. 398–407.
ICSEICSE-1984-RomanD #distributed #multi #process #specification #using
Multifaceted Distributed Systems Specification Using Processes and Event Synchronization (GCR, MSD), pp. 44–55.
CADECADE-1984-PelinG #algebra #complexity #problem #using #word
Solving Word Problems in Free Algebras Using Complexity Functions (AP, JHG), pp. 476–495.
CADECADE-1984-Plaisted #analysis #dependence #graph #proving #theorem proving #using
Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
ICLPILPC-1984-Johansson84 #logic programming #source code #symmetry #using
Using Symmetry for the Derivation of Logic Programs (ALJ), pp. 243–251.
ICLPSLP-1984-Borgwardt84 #parallel #prolog #stack #using
Parallel Prolog Using Stack Segements on Shared-Memory Multiprocessors (PB), pp. 2–11.
ICLPSLP-1984-TaylorLMS84 #logic programming #parallel #using
Logic Programming Using Parallel Associative Operations (ST, AL, GQMJ, SJS), pp. 58–68.
DACDAC-1983-BarzilaiHSTW #logic #simulation #using
Simulating pass transistor circuits using logic simulation machines (ZB, LMH, GMS, DTT, LSW), pp. 157–163.
DACDAC-1983-FukunagaYSK #approach #graph #using
Placement of circuit modules using a graph space approach (KF, SY, HSS, TK), pp. 465–471.
DACDAC-1983-JainA #generative #testing #using
Test generation for MOS circuits using D-algorithm (SKJ, VDA), pp. 64–70.
DACDAC-1983-PrazicB #array #automation #using
Automatic routing of double layer gate arrays using a moving cursor (BDP, MAB), pp. 644–650.
DACDAC-1983-RothermelM #design #using
Routing method for VLSI design using irregular cells (HJR, DAM), pp. 257–262.
DACDAC-1983-WyleczukMB #industrial
The Transfer of University Software for Industry Use (RW, LM, GB), pp. 756–761.
VLDBVLDB-1983-IbarakiKM #concept
Disjoint-Interval Topological Sort: A Useful Concept in Serializability Theory (Extended Abstract) (TI, TK, TM), pp. 89–91.
ICALPICALP-1983-AptD #axiom #logic #using
An Axiomatization of the Intermittent Assertion Method Using Temporal Logic (Extended Abstract) (KRA, CD), pp. 15–27.
ICALPICALP-1983-MycroftN #abstract interpretation #using
Strong Abstract Interpretation Using Power Domains (Extended Abstract) (AM, FN), pp. 536–547.
AdaAda-1983-Persch #compilation
The Use of Diana in Compilers, Language Transformers, Formatters and Debuggers (GP), pp. 76–87.
SIGIRSIGIR-1983-BatesB #information retrieval #interface #natural language #using
Information Retrieval Using a Transportable Natural Language Interface (MB, RJB), pp. 81–86.
SIGIRSIGIR-1983-BrooksB #analysis #design #information retrieval #interactive #using
Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
SIGIRSIGIR-1983-CroftWT #documentation #network #retrieval
A Network Organization Used for Document Retrieval (WBC, RW, RT), pp. 178–188.
SIGIRSIGIR-1983-RaghavanSY #evaluation #using
Evaluation of The 2-Poisson Model as a Basis for Using Term Frequency Data in Searching (VVR, HPS, CTY), pp. 88–100.
SIGIRSIGIR-1983-Somers #analysis #file system #recommendation #user interface
The User View of File Management: Recommendations for a User Interface Based in an Analysis of UNIX File System Use (PS), p. 161.
SIGIRSIGIR-1983-Zarri #information management #information retrieval #representation #using
Reseda, An Information Retrieval System Using Artificial Intelligence and Knowledge Representation Techniques (GPZ), pp. 189–195.
POPLPOPL-1983-ClarkeES #approach #automation #concurrent #finite #logic #specification #using #verification
Automatic Verification of Finite State Concurrent Systems Using Temporal Logic Specifications: A Practical Approach (EMC, EAE, APS), pp. 117–126.
POPLPOPL-1983-LampsonS #polymorphism
Practical Use of a Polymorphic Applicative Language (BWL, EES), pp. 237–255.
RERE-1983-Partsch #algebra #on the #requirements
On the Use of Algebraic Methods for Formal Requirements Definitions (HP), pp. 138–158.
RERE-1983-Reisig #design #petri net #using
System Design Using Petri Nets (WR), pp. 29–41.
DACDAC-1982-GrayBR #array #compilation #design #using
Designing gate arrays using a silicon compiler (JPG, IB, PSR), pp. 377–383.
DACDAC-1982-ShivaC #composition #simulation #synthesis #using
Modular description/simulation/synthesis using DDL (SGS, JAC), pp. 321–329.
DACDAC-1982-Shliferstein #interactive #using
Experiments using interactive color raster graphics for CAD (ARS), pp. 445–452.
DACDAC-1982-TeraiKSY #layout
A consideration of the number of horizontal grids used in the routing of a masterslice layout (MT, HK, KS, TY), pp. 121–128.
PODSPODS-1982-Maier #database #memory management #using
Using Write-once Memory for Database Storage (DM), pp. 239–246.
SIGMODSIGMOD-1982-KambayashiYY #database #distributed #query #using
Query Processing for Distributed Databases Using Generalized Semi-Joins (YK, MY, SY), pp. 151–160.
VLDBVLDB-1982-SaccoS #database #relational #set #using
A Mechanism for Managing the Buffer Pool in a Relational Database System Using the Hot Set Model (GMS, MS), pp. 257–262.
VLDBVLDB-1982-WhangWS #database #design #network #physics #using
Physical Design of Network Model Databases Using the Property of Separability (KYW, GW, DS), pp. 98–107.
PLDISCC-1982-KoskimiesRS #attribute grammar #compilation #using
Compiler Construction Using Attribute Grammars (KK, KJR, MS), pp. 153–159.
LISPLFP-1982-Moss #how #prolog #using
How to Define a Language Using PROLOG (CDSM), pp. 67–73.
ICGTGG-1982-Pratt #semantics #specification #using
Formal specification of software using H-graph semantics (TWP), pp. 314–332.
SIGIRSIGIR-1982-TagueN #database #retrieval #simulation #using
Simulation of Bibliographic Retrieval Databases Using Hyperterms (JT, MJN), pp. 194–208.
POPLPOPL-1982-GanapathiF #attribute grammar #code generation #using
Description-Driven Code Generation using Attribute Grammars (MG, CNF), pp. 108–119.
POPLPOPL-1982-Wolper #communication #logic #process #specification #synthesis #using
Specification and Synthesis of Communicating Processes using an Extended Temporal Logic (PW), pp. 20–33.
ICSEICSE-1982-Ling #design #diagrams #source code #using
Designing Data Entry Programs Using State Diagram as a Common Model (MML), pp. 296–308.
ASPLOSASPLOS-1982-McDaniel #analysis #set #using
An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
CADECADE-1982-Smith #synthesis
Derived Preconditions and Their Use in Program Synthesis (DRS), pp. 172–193.
CADECADE-1982-Weyhrauch #using
An Example of FOL Using Metatheory (RWW), pp. 151–158.
DACDAC-1981-Akers #algorithm #linear #on the
On the use of the linear assignment algorithm in module placement (SBA), pp. 137–144.
DACDAC-1981-AlmyR #fault #using
Using error latch trace to obtain diagnostic information (PMA, JLR), pp. 355–359.
DACDAC-1981-Scoble #interactive #using
Creating and updating space occupancy and building plans using interactive graphics (RAS), pp. 66–73.
SIGMODSIGMOD-1981-KedemS #concurrent #database #using
Deadlock Removal Using Partial Rollback in Database Systems (DSF, ZMK, AS), pp. 65–73.
SIGMODSIGMOD-1981-Sagiv #question #using
Can We Use the Universal Instance Assumption Without Using Nulls? (YS), pp. 108–120.
SIGMODSIGMOD-1981-StearnsR #concurrent #database #distributed #using
Distributed Database Concurrency Controls Using Before-Values (RES, DJR), pp. 74–83.
VLDBVLDB-1981-Sevcik #database #performance #predict #using
Data Base System Performance Prediction Using an Analytical Model (Invited Paper) (KCS), pp. 182–198.
FMPS-1981-Guttag #effectiveness #specification
A few Remarks on Putting Formal Specifications to Productive Use (JVG), pp. 370–380.
SIGIRSIGIR-1981-SmeatonR #algorithm #bound #information retrieval #nearest neighbour #problem #using
The Nearest Neighbour Problem in Information Retrieval: An Algorithm Using Upperbounds (AFS, CJvR), pp. 83–87.
ICSEICSE-1981-ChenZ #analysis #clustering #re-engineering
Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
ICSEICSE-1981-DuncanH #attribute grammar #design #implementation #using
Using Attributed Grammars to Test Designs and Implementations (AGD, JSH), pp. 170–178.
ICSEICSE-1981-KomodaHKS #analysis #approach #modelling #requirements #using
An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
DACDAC-1980-DyerLMS #design #simulation
The use of graphics processors for circuit design simulation at GTE AE Labs (JD, AL, EJM, WDS), pp. 446–450.
DACDAC-1980-Frew #algorithm #architecture #bibliography #design
A survey of space allocation algorithms in use in architectural design in the past twenty years (RSF), pp. 165–174.
DACDAC-1980-Mallmann #using
The management of engineering changes using the PRIMUS system (FPM), pp. 348–361.
DACDAC-1980-TadaYKS #performance #strict
A fast maze router with iterative use of variable search space restriction (FT, KY, TK, TS), pp. 250–254.
SIGMODSIGMOD-1980-LuskOP #database #design #implementation #using
A Practical Design Methodology for the Implementation of IMS Databases, Using the Entity-Relationship Model (ELL, RAO, BDP), pp. 9–21.
VLDBVLDB-1980-BernsteinBC #maintenance #performance #semantics #using
Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data (PAB, BTB, EMC), pp. 126–136.
STOCSTOC-1980-Yao #performance #programming #using
Efficient Dynamic Programming Using Quadrangle Inequalities (FFY), pp. 429–435.
ICALPICALP-1980-EmersonC #correctness #fixpoint #parallel #source code #using
Characterizing Correctness Properties of Parallel Programs Using Fixpoints (EAE, EMC), pp. 169–181.
ICALPICALP-1980-Turchin #optimisation #proving #theorem proving
The Use of Metasystem Transition in Theorem Proving and Program Optimization (VFT), pp. 645–657.
SIGIRSIGIR-1980-LeaS #runtime #using
An Associative File Store Using Fragments for Run-Time Indexing and Compression (RML, EJS), pp. 280–295.
POPLPOPL-1980-BuddDLS #correctness #functional #source code #using
Theoretical and Emperical Studies on Using Program Mutation to Test the Functional Correctness of Programs (TAB, RAD, RJL, FGS), pp. 220–233.
CCSDCG-1980-Reynolds #category theory #design #using
Using category theory to design implicit conversions and generic operators (JCR), pp. 211–258.
CADECADE-1980-AielloW #algebra #reasoning #using
Using Meta-Theoretic Reasoning to do Algebra (LCA, RWW), pp. 1–13.
CADECADE-1980-BundyW #algebra #multi #using
Using Meta-Level Inference for Selective Application of Multiple Rewrite Rules in Algebraic Manipulation (AB, BW), pp. 24–38.
CADECADE-1980-Furtek #constraints #distributed #formal method #realtime #specification #using #verification
Specification and Verification of Real-Time, Distributed Systems Using the Theory of Constraints (FCF), pp. 110–125.
DACDAC-1979-Ayres79a
Silicon compilation-a hierarchical use of PLAs (RA), pp. 314–326.
DACDAC-1979-CarlsonPC #3d #data transformation #design
The use of color and 3-D temporal and spatial data management techniques in computer-aided design (WEC, REP, CC), pp. 32–38.
DACDAC-1979-Chang #layout #recognition #using
LSI layout checking using bipolar device recognition technique (CSC), pp. 95–101.
DACDAC-1979-KawatoSMU #design #scalability #using #verification
Design and verification of large-scale computers by using DDL (NK, TS, FM, TU), pp. 360–366.
DACDAC-1979-KjelkerudT #deduction #fault #generative #logic #simulation #testing #using
Generation of hazard free tests using the D-algorithm in a timing accurate system for logic and deductive fault simulation (EK, OT), pp. 180–184.
DACDAC-1979-OhnoMS #logic #scalability #using #verification
Logic verification system for very large computers using LSI’s (YO, MM, KS), pp. 367–374.
DACDAC-1979-WeingartenKC #3d #interactive #named #using
DRAW3D: Time sharing graphic interaction using a device-space buffer (NHW, WK, MC), pp. 135–141.
SIGMODSIGMOD-1979-El-MasriW #integration #using
Data Model Integration Using the Structural Model (RE, GW), pp. 191–202.
PLDISCC-1979-Feldman #compilation #fortran #implementation #tool support #using
Implementation of a portable Fortran 77 compiler using modern tools (SIF), pp. 98–106.
PLDISCC-1979-Pleban #compilation #matrix #recursion
The use of transition matrices in a recursive-descent compiler (UFP), pp. 144–151.
ICALPICALP-1979-MonienS #nondeterminism #on the #turing machine
On Eliminating Nondeterminism From Turing Machines Which Use Less Than Logarithmic Worktape Space (BM, IHS), pp. 431–445.
SIGIRSIGIR-1979-Dattola #documentation #retrieval
Use of Dynamic Discrimination Values in a Document Retrieval System (RTD), pp. 23–32.
SIGIRSIGIR-1979-Jamieson #implementation #retrieval #scalability #using
The Economic Implementation of Experimental Retrieval Techniques on a Very Large Scale Using an Intelligent Terminal (SHJ), pp. 45–51.
POPLPOPL-1979-HoffmanO #generative #interpreter #pattern matching #using
Interpreter Generation Using Tree Pattern Matching (CMH, MJO), pp. 169–179.
ICSEICSE-1979-AnconaDD #development #using
Cross Software Development for Microprocessors Using a Translator Writing System (MA, GD, ELD), pp. 399–402.
ICSEICSE-1979-BauerF #generative #testing #using
Test Plan Generation Using Formal Grammars (JAB, ABF), pp. 425–432.
ICSEICSE-1979-BerryP #design #specification
The Use of a Module Interconnection Specification Capability in the SARA System Design Methodology (DMB, MH(P), pp. 294–307.
DACDAC-1978-Fortin #approximate #diagrams #named #using
BUBBLE: Relationship diagrams using iterative vector approximation (GF), pp. 145–151.
DACDAC-1978-Huey #graph #problem #reduction #using
Guiding sensitization searches using problem reduction graphs (BH), pp. 312–320.
DACDAC-1978-LekkosP #how #logic #pseudo #refinement #using
How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
DACDAC-1978-Raeger #design #interactive #using
The design of a dense PCB using an interactive DA system (DR), p. 454.
DACDAC-1978-Villers #automation #design #interactive
A minicomputer based Interactive Graphics System as used for electronic design and automation (PV), pp. 446–453.
SIGMODSIGMOD-1978-Cook #database
A Dynamic Address Computation Mechanism for Use in Database Management (TJC), pp. 78–87.
VLDBVLDB-1978-AdibaCE #database #distributed #logic #relational #using
A Distributed Data Base System Using Logical Relational Machines (MEA, JYC, CE), pp. 450–461.
VLDBVLDB-1978-BrodieS #data type #question #what
What is the Use of Abstract Data Types? (MLB, JWS), pp. 140–141.
STOCSTOC-1978-Tompa #trade-off #using
Time-Space Tradeoffs for Computing Functions, Using Connectivity Properties of their Circuits (MT), pp. 196–204.
ICALPICALP-1978-CremersH #using
Mutual Exclusion of N Processors Using an O(N)-Valued Message Variable (Extended Abstract) (ABC, TNH), pp. 165–176.
ICGTGG-1978-Pratt #graph #programming language #semantics #using
Definition of Programming Language Semantics Using Grammars for Hierarchical Graphs (TWP), pp. 389–400.
POPLPOPL-1978-Haraldsson #compilation #lisp
A Partial Evaluator, Its Use for Compiling Iterative Statements in Lisp (AH), pp. 195–202.
ICSEICSE-1978-Brooks #behaviour #comprehension #re-engineering #using
Using a Behavioral Theory of Program Comprehension in Software Engineering (REB), pp. 196–201.
ICSEICSE-1978-ChungG #diagrams
Use of State Diagrams to Engineer Communications Software (PC, BG), pp. 215–221.
ICSEICSE-1978-Lindstrom #parsing #top-down #using
Control Structure Aptness: A Cast Study Using Top-Down Parsing (GL), pp. 5–12.
DACDAC-1977-Brown #component #design #using
Using a computer aided graphics system to help design and draft automotive components (NLB), pp. 112–117.
DACDAC-1977-JaffeY #automation #diagrams #using
Automating analog circuit diagrams using a list processing language (RCJ, JPY), pp. 391–395.
DACDAC-1977-MorrisMG #network #scalability #simulation #using
Simulation of large communications networks using SPIN (ILM, JM, RG), pp. 194–204.
DACDAC-1977-Waldvogel #hybrid #multi #using
Computer designed multilayer hybrid substrate using thick film technology (CWW), pp. 351–353.
VLDBVLDB-1977-FieldsN #using
Using New Clues to Find Data (CF, NN), pp. 156–158.
POPLPOPL-1977-Soisalon-Soininen #lr #parsing #reduction
Elimination of Single Productions from LR Parsers in Conjunction with the Use of Default Reductions (ESS), pp. 183–193.
DACDAC-1976-Lerman #design #using
Computer aided design of printed circuit boards using remote graphics and TSO (HNL), pp. 104–108.
DACDAC-1976-Marks #design #documentation #online
Use of an on-line, time-shared graphics system to design and document printed circuit boards (LM), pp. 91–103.
DACDAC-1976-Zobniw #multi #realtime #using
Multi-defect real time diagnosis using a single pin probe (LMZ), pp. 179–185.
SIGMODSIGMOD-1976-WelchG #multi #order #retrieval #using
Retrieval Using Ordered Lists in Inverted and Multilist Files (JWW, JWG), pp. 21–29.
STOCSTOC-1976-IbarraK #problem
A Useful Device for Showing the Solvability of Some Decision Problems (OHI, CEK), pp. 135–140.
ICSEICSE-1976-Mashey #programming language #using
Using a Command Language as a High-Level Programming Language (JRM), pp. 169–176.
ICSEICSE-1976-Stephenson #analysis #development
An Analysis of the Resources Used in the SAFEGUARD System Software Development (WES), pp. 312–321.
ICSEICSE-1976-Stonebraker #comparison #database #relational
A Comparison of the Use of Links and Secondary Indices in a Relational Data Base System (MS), pp. 527–531.
DACDAC-1975-BlainLR #industrial
The system bal: a technique for spreading the use of CAD techniques within an industrial environment (GB, AL, JCR), pp. 77–84.
DACDAC-1975-SchulerUBB #concurrent #generative #logic #random testing #simulation #testing #using
Random test generation using concurrent logic simulation (DMS, EGU, TEB, SPB), pp. 261–267.
DACDAC-1975-Sherman #testing #using
Program function test definition using a three-value simulator (WJS), pp. 189–194.
DACDAC-1975-Zobniw #realtime #using
Real time diagnosis using single pin probe (LMZ), pp. 268–285.
SIGMODSIGMOD-1975-WelchG #information retrieval #set #using
Information Retrieval in Files Described Using Sets (JWW, JWG), pp. 92–98.
VLDBVLDB-1975-Carlson #database #interactive #problem #scalability #using
Using Large Data Bases for Interactive Problem Solving (EDC), pp. 499–501.
VLDBVLDB-1975-HofferS #analysis #clustering #database #design #physics
The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
VLDBVLDB-1975-RoussopoulosM #database #network #semantics #using
Using Semantic Networks for Database Management (NR, JM), pp. 144–172.
VLDBVLDB-1975-YaoM #using
Selection of File Organization Using an Analytic Model (SBY, AGM), pp. 255–267.
DACDAC-1974-DudnikS
A computer aided land use study technique (EED, WS), pp. 237–247.
DACDAC-1974-Los #approach #combinator #optimisation #programming
A combinatorial programming approach to the joint optimization of land use and transportation (ML), pp. 220–228.
DACDAC-1974-Sr #performance #simulation #using
Using simulation to evaluate system performance (EKBS), pp. 359–365.
DACDAC-1974-ThompsonSBP #analysis #fault #simulation #using
Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
SIGMODSIGFIDET-1974-RamirezRP #automation #generative #source code #using
Automatic Generation of Data Conversion Programs Using A Data Description Language (JAR, NAR, NSP), pp. 207–225.
ICALPICALP-1974-EhrenfeuchtR #morphism #term rewriting #trade-off
Trade-off between the Use of Nonterminals, Codings and Homomorphisms in Defining Languages for Some Classes of Rewriting Systems (AE, GR), pp. 473–480.
ICALPICALP-1974-FischerP #algorithm #matrix #performance #using
Efficient Procedures for Using Matrix Algorithms (PCF, RLP), pp. 413–427.
DACDAC-1972-Galey #named #trade-off
Microprogramming — uses and tradeoffs (JMG), p. 286.
DACDAC-1972-Grant #architecture #design #problem #proximity #using
Combining proximity criteria with nature-of-the-spot criteria in architectural and urban design space planning problems using a computer-aided space allocation technique: A proposed technique and an example of its application (DPG), pp. 197–202.
DACDAC-1972-Yessios #modelling
Modeling the site planning of homogeneous uses (CIY), pp. 203–212.
SIGMODSIGFIDET-1972-Smith #using
A Method for Data Translation Using the Stored Data Definition and Translation Task Group Languages (DCPS), pp. 107–124.
SIGMODSIGFIDET-1972-Stonebraker #performance #retrieval #using
Retrieval Efficiency Using Combined Indexes (MS), pp. 243–256.
SOSPSOSP-J-1973-CoffmanR72 #case study #clustering #locality #using
A Study of Storage Partitioning Using a Mathematical Model of Locality (EGCJ, TAR), pp. 185–190.
DACDAC-1971-Grason #approach #graph #using
An approach to computerized space planning using graph theory (JG), pp. 170–178.
DACDAC-1971-KriewallM #design #generative #interactive #named
CIBOL — an interactive graphics program used in the design of printed wiring boards and generation of associated artmasters (TJK, NRM), pp. 304–313.
SOSPSOSP-1971-CoffmanR #case study #clustering #using
A Study of Storage Partitioning Using a Mathematical Model (Abstract) (EGCJ, TAR), pp. 122–129.
DACDAC-1970-RockwellP #analysis #finite
Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
DACDAC-1970-Urban #design #effectiveness
Effective use of a computer aided design system (SJU), pp. 243–249.
SIGMODSIGFIDET-1970-Beitz #using
The Interpretation of Structured Stored Data Using Delimiters (EHB), pp. 188–200.
STOCSTOC-1970-Chang #2d #analysis #using
The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
DACDAC-1969-Radke #predict
A justification of, and an improvement on, a useful rule for predicting circuit-to-pin ratios (CER), pp. 257–267.
DACDAC-1968-CorreiaD #documentation #logic
The use of engineering documentation in support of a high density logic test system (MC, RLD).
DACDAC-1968-Marin #algorithm #logic #on the #strict #synthesis #using
On a general synthesis algorithm of logical circuits using a restricted inventory of integrated circuits (MAM).
DACSHARE-1966-Feigin #design #optimisation
Use of design optimization techniques at Norden (LF).
DACSHARE-1964-Branin #analysis #network #using
D-C and transient analysis of networks using a digital computer (FHBJ).
LISPLISP-1963-McIntosh #lisp
The use of operator predicates in LISP (HVM), p. 9.
LISPLISP-1963-Thomas #array #lisp #source code
Use of arrays in LISP. Group theory programs (BST), p. 11.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.