BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (37)
system (30)
model (25)
data (24)
inform (19)

Stem util$ (all stems)

335 papers:

CASECASE-2015-SchletteR #assembly
Utilization of motion planning strategies for micro-optical assembly (CS, JR), pp. 781–786.
DACDAC-2015-DunbarQ
A practical circuit fingerprinting method utilizing observability don’t care conditions (CD, GQ), p. 6.
DATEDATE-2015-KonstantinouKM #encryption #functional #privacy #verification
Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
SIGMODSIGMOD-2015-KatsisOPZ #incremental #maintenance
Utilizing IDs to Accelerate Incremental View Maintenance (YK, KWO, YP, KKZ), pp. 1985–2000.
SIGMODSIGMOD-2015-PengW #probability #query
k-Hit Query: Top-k Query with Probabilistic Utility Function (PP, RCWW), pp. 577–592.
SIGMODSIGMOD-2015-SheT0 #social
Utility-Aware Social Event-Participant Planning (JS, YT, LC), pp. 1629–1643.
VLDBVLDB-2015-FaulknerBL #query
k-Regret Queries with Nonlinear Utilities (TKF, WB, AL), pp. 2098–2109.
CSCWCSCW-2015-GelleyJ
Do I Need To Follow You?: Examining the Utility of The Pinterest Follow Mechanism (BG, AJ), pp. 1751–1762.
HCIDUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability
Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
HCIHCI-IT-2015-YamamotoYS #game studies #gamification
Gamification Effect of Collection System for Digital Photographs with Geographic Information which Utilizes Land Acquisition Game (RY, TY, NS), pp. 649–659.
HCISCSM-2015-BramanD #framework #personalisation
Utilizing Virtual Worlds for Personalized Search: Developing the PAsSIVE Framework (JB, CD), pp. 3–11.
ICEISICEIS-v1-2015-ConstantinonNS #heuristic
Combining Heuristic and Utility Function for Fair Train Crew Rostering (AAC, CFXdMN, AGN, AFdS), pp. 593–602.
ICMLICML-2015-GajaneUC #algorithm #exponential
A Relative Exponential Weighing Algorithm for Adversarial Utility-based Dueling Bandits (PG, TU, FC), pp. 218–227.
KDDKDD-2015-FeldmanNPR #mining #online #predict
Utilizing Text Mining on Online Medical Forums to Predict Label Change due to Adverse Drug Reactions (RF, ON, AP, BR), pp. 1779–1788.
MLDMMLDM-2015-ZidaFWLT #mining #performance
Efficient Mining of High-Utility Sequential Rules (SZ, PFV, CWW, JCWL, VST), pp. 157–171.
SACSAC-2015-DasK #using
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SACSAC-2015-Fournier-VigerZ #mining #named #performance
FOSHU: faster on-shelf high utility itemset mining — with or without negative unit profit (PFV, SZ), pp. 857–864.
SACSAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
SACSAC-2015-NetoM #3d #artificial reality #recognition
3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scanner (JBCN, ANM), pp. 66–73.
ICSEICSE-v1-2015-WinterSNSC #fault #injection #parallel
No PAIN, No Gain? The Utility of PArallel Fault INjections (SW, OS, RN, NS, DC), pp. 494–505.
ICSEICSE-v2-2015-Squire #developer #social #social media #stack overflow
“Should We Move to Stack Overflow?” Measuring the Utility of Social Media for Developer Support (MS), pp. 219–228.
ISMMISMM-2015-CameronSV #multi
The judgment of forseti: economic utility for dynamic heap sizing of multiple runtimes (CC, JS, DV), pp. 143–156.
CAVCAV-2015-GouwRBBH #java
OpenJDK’s Java.utils.Collection.sort() Is Broken: The Good, the Bad and the Worst Case (SdG, JR, FSdB, RB, RH), pp. 273–289.
ASEASE-2014-Burke #feature model
Utilizing feature location techniques for feature addition and feature enhancement (JTB), pp. 879–882.
CASECASE-2014-BrundageCLAX #energy
Utilizing energy opportunity windows and energy profit bottlenecks to reduce energy consumption per part for a serial production line (MPB, QC, YL, JA, GX), pp. 461–466.
CASECASE-2014-PengHHW #analysis #effectiveness #metric
An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
DATEDATE-2014-CastellanaTF #adaptation #configuration management #hybrid #interface #memory management
An adaptive Memory Interface Controller for improving bandwidth utilization of hybrid and reconfigurable systems (VGC, AT, FF), pp. 1–4.
DATEDATE-2014-KimKGH #energy #performance
Utilization-aware load balancing for the energy efficient operation of the big.LITTLE processor (MK, KK, JRG, SH), pp. 1–4.
DATEDATE-2014-MooreC #modelling #performance
Program affinity performance models for performance and utilization (RWM, BRC), pp. 1–4.
DRRDRR-2014-TaghvaA #fault #identification #web
Utilizing web data in identification and correction of OCR errors (KT, SA), pp. 902109–6.
SIGMODSIGMOD-2014-AilamakiLTPP #how #multi
How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off #using
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SCAMSCAM-2014-KargenS #performance #scalability #slicing
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing (UK, NS), pp. 155–164.
STOCSTOC-2014-GargMV #algorithm #equilibrium
Dichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functions (JG, RM, VVV), pp. 525–534.
HCIDUXU-DI-2014-ArfaaW14a #network #social #usability
A Usability Study on Elder Adults Utilizing Social Networking Sites (JA, Y(W), pp. 50–61.
HCIHIMI-AS-2014-Sakurai #education
The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment (YS), pp. 90–98.
HCIHIMI-DE-2014-LinKT #analysis #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-PohlSKAM #usability
Evaluating the Dot-Based Contingency Wheel: Results from a Usability and Utility Study (MP, FS, SK, BA, SM), pp. 76–86.
CIKMCIKM-2014-YilmazVCRB #analysis #documentation
Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
KDDKDD-2014-GhalwashRO #nondeterminism
Utilizing temporal patterns for estimating uncertainty in interpretable early decision making (MFG, VR, ZO), pp. 402–411.
KDIRKDIR-2014-LinDDG #data analysis
Data Analytics for Power Utility Storm Planning (LL, AD, DD, SSG), pp. 308–314.
SIGIRSIGIR-2014-RabinovichRK #feedback #retrieval
Utilizing relevance feedback in fusion-based retrieval (ER, OR, OK), pp. 313–322.
MODELSMoDELS-2014-LangerMK #behaviour #difference #semantics #specification
Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
MODELSMoDELS-2014-LangerMK #behaviour #difference #semantics #specification
Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
SACSAC-2014-MehdiIHKDS #keyword
Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
SACSAC-2014-YangZL #algorithm #debugging #developer #effectiveness #multi #recommendation
Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively (GY, TZ, BL), pp. 1134–1139.
HPCAHPCA-2014-JungK #named #resource management
Sprinkler: Maximizing resource utilization in many-chip solid state disks (MJ, MTK), pp. 524–535.
HPCAHPCA-2014-LeeSMKSCR #concurrent #resource management #scheduling #thread
Improving GPGPU resource utilization through alternative thread block scheduling (ML, SS, JM, JK, WS, YGC, SR), pp. 260–271.
DACDAC-2013-CongX #fault #programmable
Defect tolerance in nanodevice-based programmable interconnects: utilization beyond avoidance (JC, BX), p. 8.
DACDAC-2013-RostamiBKJ #question #security
Balancing security and utility in medical devices? (MR, WB, FK, AJ), p. 6.
DATEDATE-2013-AdnanG #in the cloud
Utility-aware deferred load balancing in the cloud driven by dynamic pricing of electricity (MAA, RG), pp. 262–265.
DATEDATE-2013-HeLLHY #streaming #synthesis
Utilizing voltage-frequency islands in C-to-RTL synthesis for streaming applications (XH, SL, YL, XSH, HY), pp. 992–995.
DATEDATE-2013-MillerB #parametricity #satisfiability #verification
Formal verification of analog circuit parameters across variation utilizing SAT (MM, FB), pp. 1442–1447.
DATEDATE-2013-RienerFF #fault tolerance
Improving fault tolerance utilizing hardware-software-co-synthesis (HR, SF, GF), pp. 939–942.
DocEngDocEng-2013-HarinekS
Improving term extraction by utilizing user annotations (JH, MS), pp. 185–188.
SIGMODSIGMOD-2013-WangHRN
Utility-maximizing event stream suppression (DW, YH, EAR, JFN), pp. 589–600.
CHICHI-2013-TanenbaumWDT
Democratizing technology: pleasure, utility and expressiveness in DIY and maker practice (JT, AMW, AD, KT), pp. 2603–2612.
HCIHCI-IMT-2013-GalatasPM #artificial reality #distance #multi #recognition #robust #speech #video
Robust Multi-Modal Speech Recognition in Two Languages Utilizing Video and Distance Information from the Kinect (GG, GP, FM), pp. 43–48.
HCIHIMI-LCCB-2013-NakajimaT #generative #learning #online
New Potential of E-learning by Re-utilizing Open Content Online — TED NOTE: English Learning System as an Auto-assignment Generator (AN, KT), pp. 108–117.
ICEISICEIS-v2-2013-Vagale
ePortfolio Data Utilization in LMS Learner Model (VV), pp. 489–496.
CIKMCIKM-2013-MishraRT #network #predict #process
Estimating the relative utility of networks for predicting user activities (NM, DMR, PT), pp. 1047–1056.
ECIRECIR-2013-ZhuGCLN #graph #query #recommendation
Recommending High Utility Query via Session-Flow Graph (XZ, JG, XC, YL, WN), pp. 642–655.
KDDKDD-2013-WuLYT #mining #sequence
Mining high utility episodes in complex event sequences (CWW, YFL, PSY, VST), pp. 536–544.
SIGIRSIGIR-2013-GuanZY #query
Utilizing query change for session search (DG, SZ, HY), pp. 453–462.
SIGIRSIGIR-2013-NoroziA
Kinship contextualization: utilizing the preceding and following structural elements (MAN, PA), pp. 837–840.
SIGIRSIGIR-2013-YangWH #query
Pursuing insights about healthcare utilization via geocoded search queries (SHY, RWW, EH), pp. 993–996.
SACSAC-2013-BlancoR #query #recommendation
Inferring user utility for query revision recommendation (HB, FR), pp. 245–252.
SACSAC-2013-CampioloSBG #security #twitter
Evaluating the utilization of Twitter messages as a source of security alerts (RC, LAFS, DMB, MAG), pp. 942–943.
SACSAC-2013-VasquesV #algorithm #distributed #grid #scheduling
A decentralized utility-based grid scheduling algorithm (JV, LV), pp. 619–624.
ICSTSAT-2013-GoultiaevaB
Recovering and Utilizing Partial Duality in QBF (AG, FB), pp. 83–99.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
CASECASE-2012-ShibataH
Fabric manipulation utilizing contacts with the environment (MS, SH), pp. 442–447.
STOCSTOC-2012-GargMSV #algorithm
A complementary pivot algorithm for markets under separable, piecewise-linear concave utilities (JG, RM, MAS, VVV), pp. 1003–1016.
CHICHI-2012-KuhnMSCLQD #how #multi #student
How students find, evaluate and utilize peer-collected annotated multimedia data in science inquiry with zydeco (AK, BM, SS, CC, WTL, CQ, ID), pp. 3061–3070.
CIKMCIKM-2012-LiuCBLR #graph #mining
Utilizing common substructures to speedup tensor factorization for mining dynamic graphs (WL, JC, JB, CL, KR), pp. 435–444.
CIKMCIKM-2012-LiuQ #generative #mining
Mining high utility itemsets without candidate generation (ML, JFQ), pp. 55–64.
CIKMCIKM-2012-SongKNCXB #network #social
Discretionary social network data revelation with a user-centric utility guarantee (YS, PK, SN, GC, MX, SB), pp. 1572–1576.
CIKMCIKM-2012-SunHCZD #capacity #constraints
Location selection for utility maximization with capacity constraints (YS, JH, YC, RZ, XD), pp. 2154–2158.
CIKMCIKM-2012-ZhuGCL #behaviour #mining #query #recommendation
More than relevance: high utility query recommendation by mining users’ search behaviors (XZ, JG, XC, YL), pp. 1814–1818.
ICMLICML-2012-KoepkeB #performance #predict
Fast Prediction of New Feature Utility (HAK, MB), p. 130.
ICMLICML-2012-McAfeeO #code generation #network #static analysis
Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
ICPRICPR-2012-FengB #concept #detection #image #semantics
Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
ICPRICPR-2012-TopcuKYU
Fingerprint matching utilizing non-distal phalanges (BT, MK, MKY, UU), pp. 2400–2403.
ICPRICPR-2012-WangJ12a #approach #novel #probability #recognition
A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
KDDKDD-2012-WuSTY #mining
Mining top-K high utility itemsets (CWW, BES, VST, PSY), pp. 78–86.
KDDKDD-2012-YinZC #algorithm #mining #named #performance
USpan: an efficient algorithm for mining high utility sequential patterns (JY, ZZ, LC), pp. 660–668.
KRKR-2012-WilsonM #axiom #diagrams #framework #order
An Axiomatic Framework for Influence Diagram Computation with Partially Ordered Utilities (NW, RM).
SEKESEKE-2012-SouzaR #performance
A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
SIGIRSIGIR-2012-BerardiES #automation #classification #ranking
A utility-theoretic ranking method for semi-automated text classification (GB, AE, FS), pp. 961–970.
SIGIRSIGIR-2012-KhalamanK
Utilizing inter-document similarities in federated search (SK, OK), pp. 1169–1170.
SIGIRSIGIR-2012-PantelGAH #modelling #predict #social
Social annotations: utility and prediction modeling (PP, MG, OA, KH), pp. 285–294.
ICSEICSE-2012-PetersM #fault #predict #privacy
Privacy and utility for defect prediction: Experiments with MORPH (FP, TM), pp. 189–199.
ASPLOSASPLOS-2012-JaleelNSSE #named #scheduling
CRUISE: cache replacement and utility-aware scheduling (AJ, HHNa, SS, SCSJ, JSE), pp. 249–260.
LCTESLCTES-2012-HashemiFGE #embedded #named #scalability #streaming
FORMLESS: scalable utilization of embedded manycores in streaming applications (MH, MHF, SG, CE), pp. 71–78.
CASECASE-2011-KaoCW #case study
Preliminary study of run-to-run control utilizing virtual metrology with reliance index (CAK, FTC, WMW), pp. 256–261.
CASECASE-2011-WanY #detection #fault
Fault detection of networked control systems utilizing limited possibilities of unknown packet transmission (YW, HY), pp. 619–624.
CASECASE-2011-WengerMHHZ #approach #development
Utilizing IEC 61499 in an MDA control application development approach (MW, MMM, IH, RH, AZ), pp. 495–500.
CSMRCSMR-2011-MendeKP #case study #fault #integration #on the #predict #testing
On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study (TM, RK, JP), pp. 259–268.
CHICHI-2011-BahamondezWS #education #mobile #multi
Utilizing multimedia capabilities of mobile phones to support teaching in schools in rural panama (EdCVB, CW, AS), pp. 935–944.
CHICHI-2011-ParuthiT #internet #low cost
Utilizing DVD players as low-cost offline internet browsers (GP, WT), pp. 955–958.
CHICHI-2011-ToomimKPL #human-computer #interactive #metric #towards
Utility of human-computer interactions: toward a science of preference measurement (MT, TK, CP, JAL), pp. 2275–2284.
HCIDUXU-v2-2011-RyderSY #framework #grid
The Grid Intelligent Planning Framework: Planning Electric Utility Investments in a Time of Accelerating Change (GR, FS, SY), pp. 205–214.
HCIHCI-MIIE-2011-BlockLT #approach #social #social media
A Context Centric Approach to Utilize Social Media Services on Public Terminals (MB, JL, ST), pp. 474–482.
HCIHCI-UA-2011-AbrahamJ #comprehension #perspective #why
An Enriched Understanding of Why the Environment and Individual Characteristics Are Important in Understanding Technology Utilization in Healthcare: An Evolutionary Psychology Perspective (CA, IAJ), pp. 141–150.
HCIHIMI-v1-2011-IidaINM #process
Utilization of Shadow Media — Supporting Co-Creation of Bodily Expression Activity in a Group (KI, SI, HN, YM), pp. 408–417.
HCIIDGD-2011-BrandND #embedded #interactive #network #social #using
Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
HCIIDGD-2011-HwangY #interface #multi
Accommodating Both Expert Users and Novice Users in One Interface by Utilizing Multi-layer Interface in Complex Function Products (TKPH, HYY), pp. 159–165.
HCIIDGD-2011-LuL #case study
A Study of Producing Ceramic Glaze Utilizing Shihmen Reservoir Silt (CCL, PHL), pp. 201–210.
ICEISICEIS-J-2011-GuLZWLSLW #enterprise #evaluation #generative #information management #process #safety
Intelligent Information Acquisition and Utilization in Safety Evaluation Decision Making Process of Power Generation Enterprises (DxG, CyL, JZ, JW, WL, JS, WL, YW), pp. 162–177.
ICEISICEIS-v4-2011-AlgarniCL #case study #towards
Towards an Explanatory Model of eMarketplaces Utilization — A Case Study of Saudi Arabia (FA, YC, VCSL), pp. 63–75.
CIKMCIKM-2011-OzertemVL #set #using
Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKMCIKM-2011-XueKRP
Utility-driven anonymization in data publishing (MX, PK, CR, HKP), pp. 2277–2280.
KDDKDD-2011-Gkoulalas-DivanisL
Revisiting sequential pattern hiding to enhance utility (AGD, GL), pp. 1316–1324.
KDIRKDIR-2011-PaliwalP #clustering #documentation #proximity
Utilizing Term Proximity based Features to Improve Text Document Clustering (SP, VP), pp. 537–544.
KEODKEOD-2011-HlomaniGKS #case study #composition #evaluation #framework #ontology
Utilizing a Compositional System Knowledge Framework for Ontology Evaluation — A Case Study on BioSTORM (HH, MGG, DK, DAS), pp. 167–175.
RecSysRecSys-2011-WangSS #e-commerce #recommendation
Utilizing related products for post-purchase recommendation in e-commerce (JW, BS, NS), pp. 329–332.
SIGIRSIGIR-2011-Carterette #concept #effectiveness #framework #modelling
System effectiveness, user models, and user utility: a conceptual framework for investigation (BC), pp. 903–912.
SIGIRSIGIR-2011-JainOV #query #web
Synthesizing high utility suggestions for rare web search queries (AJ, UO, EV), pp. 805–814.
SIGIRSIGIR-2011-KrikonK #ad hoc #feedback #retrieval
Utilizing minimal relevance feedback for ad hoc retrieval (EK, OK), pp. 1099–1100.
SIGIRSIGIR-2011-LinZD #approximate #documentation #optimisation
Best document selection based on approximate utility optimization (HHL, YZ, JD), pp. 1215–1216.
SIGIRSIGIR-2011-Tyler #behaviour #multi #persistent #personalisation
Persistence in the ephemeral: utilizing repeat behaviors for multi-session personalized search (SKT), pp. 1311–1312.
SIGIRSIGIR-2011-WangZ #e-commerce #recommendation
Utilizing marginal net utility for recommendation in e-commerce (JW, YZ), pp. 1003–1012.
MODELSMoDELS-2011-RamirezC #automation #monitoring #requirements
Automatic Derivation of Utility Functions for Monitoring Software Requirements (AJR, BHCC), pp. 501–516.
MODELSMoDELS-2011-RamirezC #automation #monitoring #requirements
Automatic Derivation of Utility Functions for Monitoring Software Requirements (AJR, BHCC), pp. 501–516.
SACSAC-2011-GuerraF #realtime #resource management
Handling overload of target sensitive real-time applications for increased system utility and improved resource usage (RG, GF), pp. 742–747.
ICSEICSE-2011-NohrerRE #consistency #effectiveness #nondeterminism
Positive effects of utilizing relationships between inconsistencies for more effective inconsistency resolution (AN, AR, AE), pp. 864–867.
CGOCGO-2011-SondagR #manycore #symmetry
Phase-based tuning for better utilization of performance-asymmetric multicore processors (TS, HR), pp. 11–20.
CASECASE-2010-ParkB
Utility-based dynamic control of batch processing systems (HP, AB), pp. 439–444.
DACDAC-2010-VeetilCSB #monte carlo #performance #resource management
Efficient smart monte carlo based SSTA on graphics processing units with improved resource utilization (VV, YHC, DS, DB), pp. 793–798.
HTHT-2010-BeelG10a #mindmap
Enhancing search applications by utilizing mind maps (JB, BG), pp. 303–304.
PODSPODS-2010-KiferL #axiom #privacy #statistics #towards
Towards an axiomatization of statistical privacy and utility (DK, BRL), pp. 147–158.
VLDBVLDB-2010-ChaytorW #privacy
Small Domain Randomization: Same Privacy, More Utility (RC, KW), pp. 608–618.
VLDBVLDB-2010-CormodeLLS
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
VLDBVLDB-2010-McConnellPH #approach #named #performance #reliability #replication
iFlow: An Approach for Fast and Reliable Internet-Scale Stream Processing Utilizing Detouring and Replication (CM, FP, JHH), pp. 1557–1560.
CSMRCSMR-2010-MyersSS #debugging #scalability
Utilizing Debug Information to Compact Loops in Large Program Traces (DM, MADS, MS), pp. 41–50.
ICPCICPC-2010-RatiuH #program analysis #web
Utilizing Web Search Engines for Program Analysis (DR, LH), pp. 94–103.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
PLDIPLDI-2010-XuMARSS #data type
Finding low-utility data structures (G(X, NM, MA, AR, ES, GS), pp. 174–186.
CHICHI-2010-ChengLCLK #named
iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers (KYC, RHL, BYC, RHL, SYK), pp. 1155–1164.
CIKMCIKM-2010-QianCXQ #how
How about utilizing ordinal information from the distribution of unlabeled data (MQ, BC, HX, HQ), pp. 289–298.
CIKMCIKM-2010-ShiN #dependence #using
Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
CIKMCIKM-2010-TylerWZ #information retrieval #personalisation
Utilizing re-finding for personalized information retrieval (SKT, JW, YZ), pp. 1469–1472.
CIKMCIKM-2010-YilmazSCR #evaluation #web
Expected browsing utility for web search evaluation (EY, MS, NC, SR), pp. 1561–1564.
ICPRICPR-2010-SchelsS #approach #classification #image #multi #sequence
A Multiple Classifier System Approach for Facial Expressions in Image Sequences Utilizing GMM Supervectors (MS, FS), pp. 4251–4254.
KDDKDD-2010-TsengWSY #algorithm #mining #named #performance
UP-Growth: an efficient algorithm for high utility itemset mining (VST, CWW, BES, PSY), pp. 253–262.
RecSysRecSys-2010-Said #hybrid #identification #recommendation
Identifying and utilizing contextual data in hybrid recommender systems (AS), pp. 365–368.
SACSAC-2010-BautistaSHPD #clustering #power management #requirements #set
Dynamic task set partitioning based on balancing resource requirements and utilization to reduce power consumption (DB, JS, HH, SP, JD), pp. 521–526.
SACSAC-2010-ShieTY #data type #mining #online
Online mining of temporal maximal utility itemsets from data streams (BES, VST, PSY), pp. 1622–1626.
CASECASE-2009-Srinivasan #communication
Sustaining manufacturing assets through smarter utilization of information and communication technologies (VS), pp. 478–482.
DACDAC-2009-UzelacM #realtime
A real-time program trace compressor utilizing double move-to-front method (VU, AM), pp. 738–743.
ICDARICDAR-2009-KimRLK #consistency #recognition
Utilizing Consistency Context for Handwritten Mathematical Expression Recognition (KK, THR, JSL, JHK), pp. 1051–1055.
STOCSTOC-2009-GhoshRS #privacy
Universally utility-maximizing privacy mechanisms (AG, TR, MS), pp. 351–360.
HCIHCD-2009-Yamazaki #approach #design #prototype
Approach to Human Centered Design Innovation by Utilized Paper Prototyping (KY), pp. 367–373.
HCIHCI-AUII-2009-WelchLLWSW #artificial reality #interactive #paradigm #social
An Affect-Sensitive Social Interaction Paradigm Utilizing Virtual Reality Environments for Autism Intervention (KCW, UL, CL, RW, NS, ZW), pp. 703–712.
HCIHCI-VAD-2009-KashiwagiXSKO #learning #physics #process
A Language Learning System Utilizing RFID Technology for Total Physical Response Activities (HK, YX, YS, MK, KO), pp. 119–128.
HCIHIMI-DIE-2009-KawashimoSDAT
A Skill Transfer Method for Manual Machine Tool Operation Utilizing Cutting Sound (TK, NS, DD, MA, TT), pp. 77–86.
ICEISICEIS-AIDSS-2009-BiscarriMLGBM #detection #framework #mining
A Mining Framework to Detect Non-technical Losses in Power Utilities (FB, IM, CL, JIG, JB, RM), pp. 96–101.
ICEISICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #using #xml
A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
ICEISICEIS-SAIC-2009-TruongMLBCDGKLMMPSW #enterprise
Email-based Interoperability Service Utilities for Cooperative Small and Medium Enterprises (HLT, EM, ML, TB, MC, CD, PG, KK, DLL, CAM, CM, AP, MS, DW), pp. 95–101.
CIKMCIKM-2009-KrikonKB #ranking
Utilizing inter-passage and inter-document similarities for re-ranking search results (EK, OK, MB), pp. 1597–1600.
ECIRECIR-2009-YiA #case study #comparative #information retrieval #modelling #topic
A Comparative Study of Utilizing Topic Models for Information Retrieval (XY, JA), pp. 29–41.
KDDKDD-2009-DuFWA #communication #generative #network #scalability
Large human communication networks: patterns and a utility-driven generator (ND, CF, BW, LA), pp. 269–278.
KDDKDD-2009-Last #data mining #mining
Improving data mining utility with projective sampling (ML), pp. 487–496.
KDDKDD-2009-LiL #on the #privacy #trade-off
On the tradeoff between privacy and utility in data publishing (TL, NL), pp. 517–526.
KDIRKDIR-2009-Weichselbraun #approach #optimisation
A Utility Centered Approach for Evaluating and Optimizing Geo-tagging (AW), pp. 134–139.
REFSQREFSQ-2009-KhurumGAF #empirical #requirements
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
SACSAC-2009-MasaruS #algorithm #modelling #search-based
Daily demand forecasting of new products utilizing diffusion models and genetic algorithms (TM, MS), pp. 1106–1107.
PPoPPPPoPP-2009-YangWXDZ #graph #optimisation
Comparability graph coloring for optimizing utilization of stream register files in stream processors (XY, LW, JX, YD, YZ), pp. 111–120.
SIGMODSIGMOD-2008-PanZW #clustering #composition #dataset #matrix #named #performance #scalability
CRD: fast co-clustering on large datasets utilizing sampling-based matrix decomposition (FP, XZ, WW), pp. 173–184.
CHICHI-2008-ShenoyT #image
Human-aided computing: utilizing implicit human processing to classify images (PS, DST), pp. 845–854.
ICEISICEIS-AIDSS-2008-BiscarriMLGBM #data mining #mining #variability
A Data Mining Method Based on the Variability of the Customer Consumption — A Special Application on Electric Utility Companies (FB, IM, CL, JIG, JB, RM), pp. 370–374.
ICEISICEIS-AIDSS-2008-LamKL #knowledge-based #metric #performance #resource management
A Knowledge-Based Performance Measurement System for Improving Resource Utilization (ACYL, SKK, WBL), pp. 187–192.
CIKMCIKM-2008-OzcanAU #query
Utilization of navigational queries for result presentation and caching in search engines (RO, ISA, ÖU), pp. 1499–1500.
ECIRECIR-2008-BenderskyK #documentation #modelling #retrieval
Utilizing Passage-Based Language Models for Document Retrieval (MB, OK), pp. 162–174.
KDDKDD-2008-BrickellS #cost analysis #privacy
The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
SEKESEKE-2008-DebOP #deployment #distributed #self
Self-managed Deployment in a Distributed Environment via Utility Functions (DD, MJO, JP), pp. 808–813.
SIGIRSIGIR-2008-LinS #automation #evaluation #how #simulation #towards
How do users find things with PubMed?: towards automatic utility evaluation with user simulations (JJL, MDS), pp. 19–26.
SIGIRSIGIR-2008-XuDW #dependence #semantics
Utilizing phrase based semantic information for term dependency (YX, FD, BW), pp. 855–856.
ECMFAECMDA-FA-2008-FritzscheGFSKB #analysis #modelling #performance #towards
Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
SACSAC-2008-Andersson #bound #scheduling
The utilization bound of uniprocessor preemptive slack-monotonic scheduling is 50% (BA), pp. 281–283.
CASECASE-2007-LeungG #behaviour #locality #multi
Multi-Robot Localization and Mapping Strategy: Utilizing Behavior Based Dynamic Tree Structure and Observer-explorer Routine (KKKL, GG), pp. 881–886.
DATEDATE-2007-FaragES #2d #configuration management #using
Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
DATEDATE-2007-HungIGS #fault
Utilization of SECDED for soft error and variation-induced defect tolerance in caches (LDH, HI, MG, SS), pp. 1134–1139.
HTHT-2007-ZhouGTB #automation #generative #hypermedia #modelling #named
LLAMA: automatic hypertext generation utilizing language models (DZ, JG, MT, TJB), pp. 77–80.
ICDARICDAR-2007-HickinbothamC #knowledge-based #recognition
Knowledge-Based Recognition of Utility Map Sub-Diagrams (SJH, AGC), pp. 213–217.
VLDBVLDB-2007-LeeZL #approach #concurrent #distributed #integration #query #throughput
Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concurrent Distributed Queries (RL, MZ, HL), pp. 1219–1230.
VLDBVLDB-2007-RastogiHS #bound #privacy
The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
CHICHI-2007-GluckBM
Matching attentional draw with utility in interruption (JG, AB, JM), pp. 41–50.
HCIHCI-IDU-2007-ResterPWHMPO #evaluation #interactive
Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
HCIHCI-IDU-2007-WideroosP #empirical #research
Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research (KW, SP), pp. 976–984.
AdaEuropeAdaEurope-2007-WellingsB #ada #realtime
Real-Time Utilities for Ada 2005 (AJW, AB), pp. 1–14.
CIKMCIKM-2007-MelucciW #feedback #geometry
Utilizing a geometry of context for enhanced implicit feedback (MM, RWW), pp. 273–282.
ECIRECIR-2007-BettsMO #classification #information management
The Utility of Information Extraction in the Classification of Books (TB, MM, JO), pp. 295–306.
SIGIRSIGIR-2007-DingL #mining
The utility of linguistic rules in opinion mining (XD, BL), pp. 811–812.
SIGIRSIGIR-2007-YangLLHKR #documentation
Utility-based information distillation over temporally sequenced documents (YY, AL, NL, AH, BK, MR), pp. 31–38.
ICSEICSE-2007-Ludi #requirements
Introducing Accessibility Requirements through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course (SL), pp. 736–743.
ICSEICSE-2007-NgCCY #design pattern #effectiveness #maintenance #question
Do Maintainers Utilize Deployed Design Patterns Effectively? (THN, SCC, WKC, YTY), pp. 168–177.
HPDCHPDC-2007-LeeS #analysis #performance #precise
Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
ASEASE-2006-Maurer #assembly
The Rearranger — A New Assembler Utility (WDM), pp. 357–358.
SIGMODSIGMOD-2006-KiferG #dataset #injection
Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
STOCSTOC-2006-Feige #on the
On maximizing welfare when utility functions are subadditive (UF), pp. 41–50.
CHICHI-2006-PrabakerBC #authoring #documentation #evaluation #programming #using
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
CHICHI-2006-RanjanBC
Searching in audio: the utility of transcripts, dichotic presentation, and time-compression (AR, RB, MHC), pp. 721–730.
ICEISICEIS-AIDSS-2006-Zenzerovic #reasoning
Utilization of Case-Based Reasoning in Auditing — Determining the Audit Fee (RZ), pp. 182–188.
ICEISICEIS-DISI-2006-OommenC #database #on the #optimisation #query
On Utilizing Attribute Cardinality Maps to Enhance Query Optimization in the Oracle Database System (BJO, JC), pp. 23–35.
ICEISICEIS-J-2006-OommenC06a #database #on the #optimisation #query
On Enhancing Query Optimization in the Oracle Database System by Utilizing Attribute Cardinality Maps (BJO, JC), pp. 38–71.
CIKMCIKM-2006-ZhangV
Utility scoring of product reviews (ZZ, BV), pp. 51–57.
ICPRICPR-v2-2006-DagliRH #information management
Utilizing Information Theoretic Diversity for SVM Active Learn (CKD, SR, TSH), pp. 506–511.
ICPRICPR-v2-2006-IlonenPKK #classification
Gaussian mixture pdf in one-class classification: computing and utilizing confidence values (JI, PP, JKK, HK), pp. 577–580.
ICPRICPR-v3-2006-WangL06a #adaptation #image #persistent
Adaptive Persistence Utilizing Motion Compensation for Ultrasound Images (GW, DCL), pp. 726–729.
KDDKDD-2006-XuWPWSF #using
Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
SIGIRSIGIR-2006-KurlandL #clustering #exclamation #modelling
Respect my authority!: HITS without hyperlinks, utilizing cluster-based language models (OK, LL), pp. 83–90.
SACSAC-2006-ChoRJ #embedded #on the #realtime #scheduling
On utility accrual processor scheduling with wait-free synchronization for embedded real-time software (HC, BR, EDJ), pp. 918–922.
HPDCHPDC-2006-AuYoungRWW #contract
Service contracts and aggregate utility functions (AA, LR, SW, JW), pp. 119–131.
DATEDATE-2005-WuRJ #energy #realtime #scheduling
Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model (HW, BR, EDJ), pp. 474–479.
ICSMEICSM-2005-WhiteJR #object-oriented #testing
Utilization of Extended Firewall for Object-Oriented Regression Testing (LJW, KJ, BR), pp. 695–698.
MLDMMLDM-2005-DuKAB #algorithm #clustering #encoding #multi #search-based
Alternative Clustering by Utilizing Multi-objective Genetic Algorithm with Linked-List Based Chromosome Encoding (JD, EEK, RA, KB), pp. 346–355.
SIGIRSIGIR-2005-Hosanagar #approach #distributed #information retrieval
A utility theoretic approach to determining optimal wait times in distributed information retrieval (KH), pp. 91–97.
SIGIRSIGIR-2005-WhiteRJ #case study #feedback
A study of factors affecting the utility of implicit relevance feedback (RWW, IR, JMJ), pp. 35–42.
RERE-2005-Cleland-HuangSDZ #requirements #traceability
Utilizing Supporting Evidence to Improve Dynamic Requirements Traceability (JCH, RS, CD, XZ), pp. 135–144.
SACSAC-2005-FeizabadiRJ #algorithm #named #scheduling
MSA: a memory-aware utility accrual scheduling algorithm (SF, BR, EDJ), pp. 857–862.
ESEC-FSEESEC-FSE-2005-Sherriff #fault #validation #verification
Utilizing verification and validation certificates to estimate software defect density (MS), pp. 381–384.
ICSTSAT-2005-LewisSB #satisfiability
Speedup Techniques Utilized in Modern SAT Solvers (MDTL, TS, BB), pp. 437–443.
DATEDATE-DF-2004-ChenLHBB #design #network
Utilizing Formal Assertions for System Design of Network Processors (XC, YL, HH, LNB, FB), pp. 126–133.
DATEDATE-v2-2004-NakashimaIOM
ULSI Interconnect Length Distribution Model Considering Core Utilization (HN, JI, KO, KM), pp. 1210–1217.
SIGMODSIGMOD-2004-DarHS #database #towards
dbSwitch™ — Towards a Database Utility (SD, GH, ES), pp. 892–896.
ICALPICALP-2004-CodenottiV #equilibrium #performance
Efficient Computation of Equilibrium Prices for Markets with Leontief Utilities (BC, KRV), pp. 371–382.
CHICHI-2004-JackoBKMEES #feedback #multimodal #visual notation
Isolating the effects of visual impairment: exploring the effect of AMD on the utility of multimodal feedback (JAJ, LB, TK, KPM, PJE, VKE, FS), pp. 311–318.
ICEISICEIS-v1-2004-CavalieriDFR #middleware #scalability
A Middleware for the Management of Large Utilities Plants (SC, FD, CF, AR), pp. 99–104.
ICEISICEIS-v1-2004-DimassiSR #concept #implementation
The Concept and Implementation of the Market Place E-Utilities*COM (JD, CS, CR), pp. 337–347.
CIKMCIKM-2004-SiC #framework
Unified utility maximization framework for resource selection (LS, JPC), pp. 32–41.
ICMLICML-2004-WierstraW #markov #modelling
Utile distinction hidden Markov models (DW, MW).
ICPRICPR-v3-2004-MiyoshiLKYN #automation #geometry
Automatic Extraction of Buildings Utilizing Geometric Features of a Scanned Topographic Map (TM, WL, KK, HY, EN), pp. 626–629.
KRKR-2004-GonzalesP #elicitation #network
GAI Networks for Utility Elicitation (CG, PP), pp. 224–234.
SIGIRSIGIR-2004-LiuLYM #approach #documentation #effectiveness #retrieval
An effective approach to document retrieval via utilizing WordNet and recognizing phrases (SL, FL, CTY, WM), pp. 266–272.
SACSAC-2004-Binemann-Zdanowicz #named #towards
SiteLang: : Edu: towards a context-driven e-learning content utilization model (ABZ), pp. 924–928.
SACSAC-2004-GossnerMS #development #interface #java
Interface utilization in the Java Development Kit (JG, PM, FS), pp. 1310–1315.
HPDCHPDC-2004-KramerM #grid #using
Utilization of a Local Grid of Mac OS X-Based Computers using Xgrid (DAK, MM), pp. 264–265.
DACDAC-2003-ChoiK #design #embedded #layout #memory management #performance
Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
ICEISICEIS-v3-2003-AkatsuKK #analysis #parametricity
Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
CIKMCIKM-2003-RadevT #evaluation #summary #using
Summarization evaluation using relative utility (DRR, DT), pp. 508–511.
ICMLICML-2003-FanLM
Utilizing Domain Knowledge in Neuroevolution (JF, RL, RM), pp. 170–177.
ICMLICML-2003-KennedyJ #learning #problem
Characteristics of Long-term Learning in Soar and its Application to the Utility Problem (WGK, KADJ), pp. 337–344.
KDDKDD-2003-BarryZM #architecture #information management #simulation
Architecting a knowledge discovery engine for military commanders utilizing massive runs of simulations (PSB, JZ, MM), pp. 699–704.
POPLPOPL-2003-BaconCR #consistency #garbage collection #realtime
A real-time garbage collector with low overhead and consistent utilization (DFB, PC, VTR), pp. 285–298.
HPDCHPDC-2003-JiangX #architecture #named #on-demand
SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms (XJ, DX), pp. 174–183.
DACDAC-2002-AbbaspourZ
Retargetable binary utilities (MA, JZ), pp. 331–336.
SEKESEKE-2002-RaffoHV #framework #hybrid #metric #modelling #process #trade-off #using
Software process decision support: making process tradeoffs using a hybrid metrics, modeling and utility framework (DR, WH, JV), pp. 803–809.
HPDCHPDC-2002-Plale #data type #memory management #runtime
Leveraging Run Time Knowledge about Event Rates to Improve Memory Utilization in Wide Area Data Stream Filtering (BP), pp. 171–178.
ICTSSTestCom-2002-EbnerYL
A Definition and Utilization of OMG IDL to TTCN-3 Mappings (ME, AY, ML), p. 443–?.
DACDAC-2001-Gebotys #embedded #memory management
Utilizing Memory Bandwidth in DSP Embedded Processors (CHG), pp. 347–352.
ITiCSEITiCSE-2001-Ginat #algorithm #learning #problem
Metacognitive awareness utilized for learning control elements in algorithmic problem solving (DG), pp. 81–84.
ICMLICML-2001-ChajewskaKO #behaviour #learning
Learning an Agent’s Utility Function by Observing Behavior (UC, DK, DO), pp. 35–42.
ICMLICML-2001-SchefferW #incremental #information management #problem
Incremental Maximization of Non-Instance-Averaging Utility Functions with Applications to Knowledge Discovery Problems (TS, SW), pp. 481–488.
SIGIRSIGIR-2001-FranzMWZ01a #corpus #parallel
Quantifying the Utility of Parallel Corpora (MF, JSM, TW, WJZ), pp. 398–399.
FSEESEC-FSE-2001-ConradiD #empirical #experience
An empirical study on the utility of formal routines to transfer knowledge and experience (RC, TD), pp. 268–276.
SOSPSOSP-2001-RowstronD #peer-to-peer #persistent #scalability
Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility (AITR, PD), pp. 188–201.
ITiCSEITiCSE-2000-BarrosP
A versatile assignment in CS 2(poster session): a file compression utility based on the Huffman code (JPB, RP), p. 185.
ICPRICPR-v1-2000-KamijoMIS #markov #random #robust
Occlusion Robust Tracking Utilizing Spatio-Temporal Markov Random Field Model (SK, YM, KI, MS), pp. 1140–1144.
KDDKDD-2000-SchefferW #algorithm
A sequential sampling algorithm for a general class of utility criteria (TS, SW), pp. 330–334.
TOOLSTOOLS-USA-2000-WolfIBP #modelling #object-oriented #tool support #uml
UML Tool Support: Utilization of Object-Oriented Models (MW, EI, RB, IP), pp. 529–534.
ASPLOSASPLOS-2000-KawahitoKN #effectiveness #hardware #null #pointer
Effective Null Pointer Check Elimination Utilizing Hardware Trap (MK, HK, TN), pp. 139–149.
OSDIOSDI-2000-LumbSGNR #towards
Towards Higher Disk Head Utilization: Extracting “Free” Bandwidth from Busy Disk Drives (CRL, JS, GRG, DN, ER), pp. 87–102.
PODSPODS-1999-ChuHS #optimisation #query
Least Expected Cost Query Optimization: An Exercise in Utility (FCC, JYH, PS), pp. 138–147.
HCIHCI-CCAD-1999-NumanoMTMNFM #fault #reduction
Reduction of human errors in plant operation utilizing human error correction function as an individual and crew (MN, KM, KT, HM, YN, JF, YM), pp. 1206–1210.
HCIHCI-EI-1999-SundareswaranBCW #3d #artificial reality #distributed #recognition #speech
A Distributed System for Device Diagnostics Utilizing Augmented Reality, 3D Audio, and Speech Recognition (VS, RB, SC, KW), pp. 466–470.
SEKESEKE-1999-AlthoffBHMNST #maintenance #repository #reuse
Systematic Population, Utilization, and Maintenance of a Repository for Comprehensive Reuse (KDA, AB, SH, WM, MN, DS, CT), pp. 25–50.
SEKESEKE-1999-Giaever #information management
Collecting, Storing and Utilizing Information about Improvement Opportunities: A Discussion of the Non-Technological Barriers to Success (HMG), pp. 205–209.
SIGMODSIGMOD-1998-ChaudhuriN #analysis
AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
ICGTTAGT-1998-Rudolf #constraints #graph #pattern matching #performance
Utilizing Constraint Satisfaction Techniques for Efficient Graph Pattern Matching (MR), pp. 238–251.
CIKMCIKM-1998-Horvitz #policy
Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
HPDCHPDC-1998-AndersenA #case study #clustering #implementation #multi
Implementation and Utilization of a Heterogeneous Multicomputer Cluster for the Study of Load Balancing Strategies (PHA, JKA), pp. 362–363.
HPDCHPDC-1998-DiwanG #adaptation #approach #communication
Adaptive Utilization of Communication and Computational Resources in High-Performance Distribution Systems: The EMOP Approach (SD, DG), pp. 2–9.
HPDCHPDC-1998-JuddCS #approach
The DOGMA Approach to High-Utilization Supercomputing (GJ, MJC, QS), pp. 64–70.
DATEEDTC-1997-PandaDN #embedded #memory management #performance
Efficient utilization of scratch-pad memory in embedded processor applications (PRP, NDD, AN), pp. 7–11.
ICDARICDAR-1997-VossepoelSD #memory management #performance
Memory efficient skeletonization of utility maps (AMV, KS, CFPD), pp. 797–800.
CSEETCSEET-1997-SchlimmerH #modelling #re-engineering
Utilizing Corporate Models in a Software Engineering Studio (JCS, JRH), pp. 185–191.
HCIHCI-CC-1997-Al-KhaldiA #empirical
Computer Utilization and Attitude: Empirical Evidence from Saudi Arabia (MAAK, IMAJ), pp. 785–788.
HCIHCI-SEC-1997-ZanottiRC
Human Factors Principles for Variable Message Signs Utilized in Intelligent Transportation Systems (AZ, MLR, GC), pp. 339–342.
SACSAC-1997-ChundiRR #database #distributed #multi #transaction
Multi-site distributed database transactions utilizing deferred update (PC, DJR, SSR), pp. 118–122.
SACSAC-1997-MortonB #mobile
Utilizing mobile computing in the Wishard Memorial Hospital ambulatory service (SM, OAB), pp. 287–294.
HPDCHPDC-1997-KimL #distributed #network #parallel
Utilizing Heterogeneous Networks in Distributed Parallel Computing Systems (JK, DJL), pp. 336–345.
CIAAWIA-1996-Noord #automaton #finite
FSA Utilities: A Toolbox to Manipulate Finite-State Automata (GvN), pp. 87–108.
ICPRICPR-1996-SauvolaP #composition #documentation #interface
A document management interface utilizing page decomposition and content-based compression (JJS, MP), pp. 752–757.
KRKR-1996-BacchusG #independence
Utility Independence in a Qualitative Decision Theory (FB, AJG), pp. 542–552.
ICDARICDAR-v1-1995-NakajimaY #automation #database #recognition
Automatic recognition of facility drawings and street maps utilizing the facility management database (CN, TY), pp. 516–519.
ICMLICML-1995-McCallum #learning
Instance-Based Utile Distinctions for Reinforcement Learning with Hidden State (AM), pp. 387–395.
SACSAC-1995-VagelatosTTC
Utilization of a lexicon for spelling correction in modern Greek (AV, TT, CT, DC), pp. 267–271.
HPCAHPCA-1995-McKeeW
Access Ordering and Memory-Conscious Cache Utilization (SAM, WAW), pp. 253–262.
CAVCAV-1995-EmersonS #approach #model checking #symmetry
Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automata-theoretic Approach (EAE, APS), pp. 309–324.
DACDAC-1994-PotkonjakD #optimisation #resource management #testing #using
Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
VLDBVLDB-1994-NgY #on-demand
Maximizing Buffer and Disk Utilizations for News On-Demand (RTN, JY), pp. 451–462.
CSCWCSCW-1994-KrautRCF #communication #social
Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium (REK, RER, CC, RSF), pp. 13–21.
CAiSECAiSE-1994-Keszenheimer #abstraction #behaviour #evolution #maintenance
Utilizing Behavioral Abstractions to Facilitate Maintenance During Class Evolution (LMK), pp. 325–338.
DACDAC-1993-KimL #multi #synthesis
Utilization of Multiport Memories in Data Path Synthesis (TK, CLL), pp. 298–302.
HTHT-1993-SaltonA #traversal
Selective Text Utilization and Text Traversal (GS, JA), pp. 131–144.
ICDARICDAR-1993-CaesarGM93a #adaptation #classification #scalability #set
Utilization of large disordered sample sets for classifier adaptation in complex domains (TC, JMG, EM), pp. 790–793.
ICDARICDAR-1993-NakamuraFN #comprehension #diagrams #natural language
Diagram understanding utilizing natural language text (YN, RF, MN), pp. 614–618.
HCIHCI-SHI-1993-Jones #3d #diagrams #estimation #information management
3-D Diagrams for Knowledge Engineering: An Early Estimation of Utility (SJ), pp. 561–566.
ICMLICML-1993-McCallum #memory management
Overcoming Incomplete Perception with Util Distinction Memory (AM), pp. 190–196.
SEKESEKE-1993-YoshitakaHI #framework #query
A Framework for Query Processing Utilizing Knowledge (AY, MH, TI), pp. 1–10.
TOOLSTOOLS-USA-1993-WhiteW #information management #object-oriented #question
Utilization of Object-Oriented Technology in Mainstream Information Systems: if not now, when? (KW, EW), pp. 497–498.
DACDAC-1992-HamadaCC #equation #estimation
A Wire Length Estimation Technique Utilizing Neighborhood Density Equations (TH, CKC, PMC), pp. 57–61.
KRKR-1992-HaddawyH
Representations for Decision-Theoretic Planning: Utility Functions for Deadline Goals (PH, SH), pp. 71–82.
ICMLML-1992-LiuS #natural language
Augmenting and Efficiently Utilizing Domain Theory in Explanation-Based Natural Language Acquisition (RLL, VWS), pp. 282–289.
ICMLML-1992-SubramanianH #algorithm #design
Measuring Utility and the Design of Provably Good EBL Algorithms (DS, SH), pp. 426–425.
DACDAC-1991-ChewS #logic #multi #simulation
Utilizing Logic Information in Multi-Level Timing Simulation (MPC, AJS), pp. 215–218.
CAiSECAiSE-1991-Chung #design #information management #non-functional #representation #requirements
Representation and Utilization of Non-Functional Requirements for Information System Design (LC), pp. 5–30.
KRKR-1991-ProvanP
The Utility of Consistency-Based Diagnostic Techniques (GMP, DLP), pp. 461–472.
ASPLOSASPLOS-1991-CmelikKDK #analysis #benchmark #metric #set #specification
An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
DACDAC-1990-KatsadasK #multi
A Multi-Layer Router Utilizing Over-Cell Areas (EK, EK), pp. 704–708.
VLDBVLDB-1990-DrewKH #algorithm #implementation #performance
The Performance and Utility of the Cactis Implementation Algorithms (PD, RK, SEH), pp. 135–147.
CHICHI-1990-TuckO
Help by guided tasks: utilizing UIMS knowledge (RT, DRO), pp. 71–78.
ICMLML-1990-CarlsonWF #concept #induction
Search Control, Utility, and Concept Induction (BMC, JBW, DHF), pp. 85–92.
ICMLML-1990-Cohen90a #approximate #learning
Learning Approximate Control Rules of High Utility (WWC), pp. 268–276.
ICMLML-1990-Holder #machine learning #problem
The General Utility Problem in Machine Learning (LBH), pp. 402–410.
PODSPODS-1989-JohnsonS
Utilization of B-trees with Inserts, Deletes and Modifies (TJ, DS), pp. 235–246.
PODSPODS-1989-KedemT #behaviour #database #modelling #relational
Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models (ZMK, AT), pp. 336–346.
SIGMODSIGMOD-1989-Christodoulakis #performance #retrieval
Retrieval Performance Versus Disc Space Utilization on WORM Optical Discs (SC, DAF), pp. 306–314.
VLDBVLDB-1989-MurphyR #effectiveness #execution #multi #resource management
Effective Resource Utilization for Multiprocessor Join Execution (MCM, DR), pp. 67–75.
ICMLML-1989-Kokar #concept #embedded
Concept Discovery Through Utilization of Invariance Embedded in the Description Language (MMK), pp. 478–479.
ICMLML-1988-EricksonZ #experience
Utilizing Experience for Improving the Tactical Manager (MDE, JMZ), pp. 444–450.
SIGIRSIGIR-1988-BollmannR #analysis
A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
PPoPPPPEALS-1988-GuptaS #parallel #performance
Compile-time Techniques for Efficient Utilization of Parallel Memories (RG, MLS), pp. 235–246.
DACDAC-1986-KnappP #design
A design utility manager: the ADAM planning engine (DK, ACP), pp. 48–54.
SIGMODSIGMOD-1983-KambayashiY #composition #dependence #query
Query Processing Utilizing Dependencies and Horizontal Decomposition (YK, MY), pp. 55–67.
SIGIRSIGIR-1980-SaltonW #modelling
A Term Weighting Model Based on Utility Theory (GS, HW), pp. 9–22.
VLDBVLDB-1978-FoucautR #concept #design #information management
Concepts for Design of an Information System Conceptual Schema and its Utilization in the REMORA Project (OF, CR), pp. 342–350.
VLDBVLDB-1978-NakamuraM #analysis
An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
DACDAC-1977-Christley #design #interactive
Thick film substrate (Micropackage) design utilizing interactive Computer Aided Design systems (FMC), pp. 450–459.
SOSPSOSP-1973-DayH #interactive #named #operating system
ARGOS: An Operating System for a Computer Utility Supporting Interactive Instrument Control (PD, JH), pp. 28–37.
DACDAC-1972-McClure #fault #logic #simulation
Fault simulation of digital logic utilizing a small host machine (RMM), pp. 104–110.
SIGIRSIGIR-1971-Katcher #performance
Efficient Utilization of Limited Access Archival Storage in a Time Shared Environment (AMK), pp. 197–205.
DACDAC-1968-KadisTVHG #layout #source code
Building block programs for the layout of printed circuit boards utilizing integrated circuit packs (DAPSYS V.2) (RWK, KLT, WJVJ, WLH, CEG).
SOSPSOSP-1967-Graham68 #information management
Protection in an information processing utility (RMG), pp. 365–369.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.