335 papers:
- CASE-2015-SchletteR #assembly
- Utilization of motion planning strategies for micro-optical assembly (CS, JR), pp. 781–786.
- DAC-2015-DunbarQ
- A practical circuit fingerprinting method utilizing observability don’t care conditions (CD, GQ), p. 6.
- DATE-2015-KonstantinouKM #encryption #functional #privacy #verification
- Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
- SIGMOD-2015-KatsisOPZ #incremental #maintenance
- Utilizing IDs to Accelerate Incremental View Maintenance (YK, KWO, YP, KKZ), pp. 1985–2000.
- SIGMOD-2015-PengW #probability #query
- k-Hit Query: Top-k Query with Probabilistic Utility Function (PP, RCWW), pp. 577–592.
- SIGMOD-2015-SheT0 #social
- Utility-Aware Social Event-Participant Planning (JS, YT, LC), pp. 1629–1643.
- VLDB-2015-FaulknerBL #query
- k-Regret Queries with Nonlinear Utilities (TKF, WB, AL), pp. 2098–2109.
- CSCW-2015-GelleyJ
- Do I Need To Follow You?: Examining the Utility of The Pinterest Follow Mechanism (BG, AJ), pp. 1751–1762.
- DUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability
- Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
- HCI-IT-2015-YamamotoYS #game studies #gamification
- Gamification Effect of Collection System for Digital Photographs with Geographic Information which Utilizes Land Acquisition Game (RY, TY, NS), pp. 649–659.
- SCSM-2015-BramanD #framework #personalisation
- Utilizing Virtual Worlds for Personalized Search: Developing the PAsSIVE Framework (JB, CD), pp. 3–11.
- ICEIS-v1-2015-ConstantinonNS #heuristic
- Combining Heuristic and Utility Function for Fair Train Crew Rostering (AAC, CFXdMN, AGN, AFdS), pp. 593–602.
- ICML-2015-GajaneUC #algorithm #exponential
- A Relative Exponential Weighing Algorithm for Adversarial Utility-based Dueling Bandits (PG, TU, FC), pp. 218–227.
- KDD-2015-FeldmanNPR #mining #online #predict
- Utilizing Text Mining on Online Medical Forums to Predict Label Change due to Adverse Drug Reactions (RF, ON, AP, BR), pp. 1779–1788.
- MLDM-2015-ZidaFWLT #mining #performance
- Efficient Mining of High-Utility Sequential Rules (SZ, PFV, CWW, JCWL, VST), pp. 157–171.
- SAC-2015-DasK #using
- Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
- SAC-2015-Fournier-VigerZ #mining #named #performance
- FOSHU: faster on-shelf high utility itemset mining — with or without negative unit profit (PFV, SZ), pp. 857–864.
- SAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
- SAC-2015-NetoM #3d #artificial reality #recognition
- 3DLBP and HAOG fusion for face recognition utilizing Kinect as a 3D scanner (JBCN, ANM), pp. 66–73.
- ICSE-v1-2015-WinterSNSC #fault #injection #parallel
- No PAIN, No Gain? The Utility of PArallel Fault INjections (SW, OS, RN, NS, DC), pp. 494–505.
- ICSE-v2-2015-Squire #developer #social #social media #stack overflow
- “Should We Move to Stack Overflow?” Measuring the Utility of Social Media for Developer Support (MS), pp. 219–228.
- ISMM-2015-CameronSV #multi
- The judgment of forseti: economic utility for dynamic heap sizing of multiple runtimes (CC, JS, DV), pp. 143–156.
- CAV-2015-GouwRBBH #java
- OpenJDK’s Java.utils.Collection.sort() Is Broken: The Good, the Bad and the Worst Case (SdG, JR, FSdB, RB, RH), pp. 273–289.
- ASE-2014-Burke #feature model
- Utilizing feature location techniques for feature addition and feature enhancement (JTB), pp. 879–882.
- CASE-2014-BrundageCLAX #energy
- Utilizing energy opportunity windows and energy profit bottlenecks to reduce energy consumption per part for a serial production line (MPB, QC, YL, JA, GX), pp. 461–466.
- CASE-2014-PengHHW #analysis #effectiveness #metric
- An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
- DATE-2014-CastellanaTF #adaptation #configuration management #hybrid #interface #memory management
- An adaptive Memory Interface Controller for improving bandwidth utilization of hybrid and reconfigurable systems (VGC, AT, FF), pp. 1–4.
- DATE-2014-KimKGH #energy #performance
- Utilization-aware load balancing for the energy efficient operation of the big.LITTLE processor (MK, KK, JRG, SH), pp. 1–4.
- DATE-2014-MooreC #modelling #performance
- Program affinity performance models for performance and utilization (RWM, BRC), pp. 1–4.
- DRR-2014-TaghvaA #fault #identification #web
- Utilizing web data in identification and correction of OCR errors (KT, SA), pp. 902109–6.
- SIGMOD-2014-AilamakiLTPP #how #multi
- How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
- SIGMOD-2014-HeMD #policy #privacy #trade-off #using
- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
- SCAM-2014-KargenS #performance #scalability #slicing
- Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing (UK, NS), pp. 155–164.
- STOC-2014-GargMV #algorithm #equilibrium
- Dichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functions (JG, RM, VVV), pp. 525–534.
- DUXU-DI-2014-ArfaaW14a #network #social #usability
- A Usability Study on Elder Adults Utilizing Social Networking Sites (JA, Y(W), pp. 50–61.
- HIMI-AS-2014-Sakurai #education
- The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment (YS), pp. 90–98.
- HIMI-DE-2014-LinKT #analysis #collaboration #design #learning
- A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
- HIMI-DE-2014-PohlSKAM #usability
- Evaluating the Dot-Based Contingency Wheel: Results from a Usability and Utility Study (MP, FS, SK, BA, SM), pp. 76–86.
- CIKM-2014-YilmazVCRB #analysis #documentation
- Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
- KDD-2014-GhalwashRO #nondeterminism
- Utilizing temporal patterns for estimating uncertainty in interpretable early decision making (MFG, VR, ZO), pp. 402–411.
- KDIR-2014-LinDDG #data analysis
- Data Analytics for Power Utility Storm Planning (LL, AD, DD, SSG), pp. 308–314.
- SIGIR-2014-RabinovichRK #feedback #retrieval
- Utilizing relevance feedback in fusion-based retrieval (ER, OR, OK), pp. 313–322.
- MoDELS-2014-LangerMK #behaviour #difference #semantics #specification
- Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
- MoDELS-2014-LangerMK #behaviour #difference #semantics #specification
- Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
- SAC-2014-MehdiIHKDS #keyword
- Utilizing domain-specific keywords for discovering public SPARQL endpoints: a life-sciences use-case (MM, AI, AH, YK, SD, RS), pp. 333–335.
- SAC-2014-YangZL #algorithm #debugging #developer #effectiveness #multi #recommendation
- Utilizing a multi-developer network-based developer recommendation algorithm to fix bugs effectively (GY, TZ, BL), pp. 1134–1139.
- HPCA-2014-JungK #named #resource management
- Sprinkler: Maximizing resource utilization in many-chip solid state disks (MJ, MTK), pp. 524–535.
- HPCA-2014-LeeSMKSCR #concurrent #resource management #scheduling #thread
- Improving GPGPU resource utilization through alternative thread block scheduling (ML, SS, JM, JK, WS, YGC, SR), pp. 260–271.
- DAC-2013-CongX #fault #programmable
- Defect tolerance in nanodevice-based programmable interconnects: utilization beyond avoidance (JC, BX), p. 8.
- DAC-2013-RostamiBKJ #question #security
- Balancing security and utility in medical devices? (MR, WB, FK, AJ), p. 6.
- DATE-2013-AdnanG #in the cloud
- Utility-aware deferred load balancing in the cloud driven by dynamic pricing of electricity (MAA, RG), pp. 262–265.
- DATE-2013-HeLLHY #streaming #synthesis
- Utilizing voltage-frequency islands in C-to-RTL synthesis for streaming applications (XH, SL, YL, XSH, HY), pp. 992–995.
- DATE-2013-MillerB #parametricity #satisfiability #verification
- Formal verification of analog circuit parameters across variation utilizing SAT (MM, FB), pp. 1442–1447.
- DATE-2013-RienerFF #fault tolerance
- Improving fault tolerance utilizing hardware-software-co-synthesis (HR, SF, GF), pp. 939–942.
- DocEng-2013-HarinekS
- Improving term extraction by utilizing user annotations (JH, MS), pp. 185–188.
- SIGMOD-2013-WangHRN
- Utility-maximizing event stream suppression (DW, YH, EAR, JFN), pp. 589–600.
- CHI-2013-TanenbaumWDT
- Democratizing technology: pleasure, utility and expressiveness in DIY and maker practice (JT, AMW, AD, KT), pp. 2603–2612.
- HCI-IMT-2013-GalatasPM #artificial reality #distance #multi #recognition #robust #speech #video
- Robust Multi-Modal Speech Recognition in Two Languages Utilizing Video and Distance Information from the Kinect (GG, GP, FM), pp. 43–48.
- HIMI-LCCB-2013-NakajimaT #generative #learning #online
- New Potential of E-learning by Re-utilizing Open Content Online — TED NOTE: English Learning System as an Auto-assignment Generator (AN, KT), pp. 108–117.
- ICEIS-v2-2013-Vagale
- ePortfolio Data Utilization in LMS Learner Model (VV), pp. 489–496.
- CIKM-2013-MishraRT #network #predict #process
- Estimating the relative utility of networks for predicting user activities (NM, DMR, PT), pp. 1047–1056.
- ECIR-2013-ZhuGCLN #graph #query #recommendation
- Recommending High Utility Query via Session-Flow Graph (XZ, JG, XC, YL, WN), pp. 642–655.
- KDD-2013-WuLYT #mining #sequence
- Mining high utility episodes in complex event sequences (CWW, YFL, PSY, VST), pp. 536–544.
- SIGIR-2013-GuanZY #query
- Utilizing query change for session search (DG, SZ, HY), pp. 453–462.
- SIGIR-2013-NoroziA
- Kinship contextualization: utilizing the preceding and following structural elements (MAN, PA), pp. 837–840.
- SIGIR-2013-YangWH #query
- Pursuing insights about healthcare utilization via geocoded search queries (SHY, RWW, EH), pp. 993–996.
- SAC-2013-BlancoR #query #recommendation
- Inferring user utility for query revision recommendation (HB, FR), pp. 245–252.
- SAC-2013-CampioloSBG #security #twitter
- Evaluating the utilization of Twitter messages as a source of security alerts (RC, LAFS, DMB, MAG), pp. 942–943.
- SAC-2013-VasquesV #algorithm #distributed #grid #scheduling
- A decentralized utility-based grid scheduling algorithm (JV, LV), pp. 619–624.
- SAT-2013-GoultiaevaB
- Recovering and Utilizing Partial Duality in QBF (AG, FB), pp. 83–99.
- WICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
- CASE-2012-ShibataH
- Fabric manipulation utilizing contacts with the environment (MS, SH), pp. 442–447.
- STOC-2012-GargMSV #algorithm
- A complementary pivot algorithm for markets under separable, piecewise-linear concave utilities (JG, RM, MAS, VVV), pp. 1003–1016.
- CHI-2012-KuhnMSCLQD #how #multi #student
- How students find, evaluate and utilize peer-collected annotated multimedia data in science inquiry with zydeco (AK, BM, SS, CC, WTL, CQ, ID), pp. 3061–3070.
- CIKM-2012-LiuCBLR #graph #mining
- Utilizing common substructures to speedup tensor factorization for mining dynamic graphs (WL, JC, JB, CL, KR), pp. 435–444.
- CIKM-2012-LiuQ #generative #mining
- Mining high utility itemsets without candidate generation (ML, JFQ), pp. 55–64.
- CIKM-2012-SongKNCXB #network #social
- Discretionary social network data revelation with a user-centric utility guarantee (YS, PK, SN, GC, MX, SB), pp. 1572–1576.
- CIKM-2012-SunHCZD #capacity #constraints
- Location selection for utility maximization with capacity constraints (YS, JH, YC, RZ, XD), pp. 2154–2158.
- CIKM-2012-ZhuGCL #behaviour #mining #query #recommendation
- More than relevance: high utility query recommendation by mining users’ search behaviors (XZ, JG, XC, YL), pp. 1814–1818.
- ICML-2012-KoepkeB #performance #predict
- Fast Prediction of New Feature Utility (HAK, MB), p. 130.
- ICML-2012-McAfeeO #code generation #network #static analysis
- Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
- ICPR-2012-FengB #concept #detection #image #semantics
- Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
- ICPR-2012-TopcuKYU
- Fingerprint matching utilizing non-distal phalanges (BT, MK, MKY, UU), pp. 2400–2403.
- ICPR-2012-WangJ12a #approach #novel #probability #recognition
- A novel probabilistic approach utilizing clip attribute as hidden knowledge for event recognition (XW, QJ), pp. 3382–3385.
- KDD-2012-WuSTY #mining
- Mining top-K high utility itemsets (CWW, BES, VST, PSY), pp. 78–86.
- KDD-2012-YinZC #algorithm #mining #named #performance
- USpan: an efficient algorithm for mining high utility sequential patterns (JY, ZZ, LC), pp. 660–668.
- KR-2012-WilsonM #axiom #diagrams #framework #order
- An Axiomatic Framework for Influence Diagram Computation with Partially Ordered Utilities (NW, RM).
- SEKE-2012-SouzaR #performance
- A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
- SIGIR-2012-BerardiES #automation #classification #ranking
- A utility-theoretic ranking method for semi-automated text classification (GB, AE, FS), pp. 961–970.
- SIGIR-2012-KhalamanK
- Utilizing inter-document similarities in federated search (SK, OK), pp. 1169–1170.
- SIGIR-2012-PantelGAH #modelling #predict #social
- Social annotations: utility and prediction modeling (PP, MG, OA, KH), pp. 285–294.
- ICSE-2012-PetersM #fault #predict #privacy
- Privacy and utility for defect prediction: Experiments with MORPH (FP, TM), pp. 189–199.
- ASPLOS-2012-JaleelNSSE #named #scheduling
- CRUISE: cache replacement and utility-aware scheduling (AJ, HHNa, SS, SCSJ, JSE), pp. 249–260.
- LCTES-2012-HashemiFGE #embedded #named #scalability #streaming
- FORMLESS: scalable utilization of embedded manycores in streaming applications (MH, MHF, SG, CE), pp. 71–78.
- CASE-2011-KaoCW #case study
- Preliminary study of run-to-run control utilizing virtual metrology with reliance index (CAK, FTC, WMW), pp. 256–261.
- CASE-2011-WanY #detection #fault
- Fault detection of networked control systems utilizing limited possibilities of unknown packet transmission (YW, HY), pp. 619–624.
- CASE-2011-WengerMHHZ #approach #development
- Utilizing IEC 61499 in an MDA control application development approach (MW, MMM, IH, RH, AZ), pp. 495–500.
- CSMR-2011-MendeKP #case study #fault #integration #on the #predict #testing
- On the Utility of a Defect Prediction Model during HW/SW Integration Testing: A Retrospective Case Study (TM, RK, JP), pp. 259–268.
- CHI-2011-BahamondezWS #education #mobile #multi
- Utilizing multimedia capabilities of mobile phones to support teaching in schools in rural panama (EdCVB, CW, AS), pp. 935–944.
- CHI-2011-ParuthiT #internet #low cost
- Utilizing DVD players as low-cost offline internet browsers (GP, WT), pp. 955–958.
- CHI-2011-ToomimKPL #human-computer #interactive #metric #towards
- Utility of human-computer interactions: toward a science of preference measurement (MT, TK, CP, JAL), pp. 2275–2284.
- DUXU-v2-2011-RyderSY #framework #grid
- The Grid Intelligent Planning Framework: Planning Electric Utility Investments in a Time of Accelerating Change (GR, FS, SY), pp. 205–214.
- HCI-MIIE-2011-BlockLT #approach #social #social media
- A Context Centric Approach to Utilize Social Media Services on Public Terminals (MB, JL, ST), pp. 474–482.
- HCI-UA-2011-AbrahamJ #comprehension #perspective #why
- An Enriched Understanding of Why the Environment and Individual Characteristics Are Important in Understanding Technology Utilization in Healthcare: An Evolutionary Psychology Perspective (CA, IAJ), pp. 141–150.
- HIMI-v1-2011-IidaINM #process
- Utilization of Shadow Media — Supporting Co-Creation of Bodily Expression Activity in a Group (KI, SI, HN, YM), pp. 408–417.
- IDGD-2011-BrandND #embedded #interactive #network #social #using
- Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
- IDGD-2011-HwangY #interface #multi
- Accommodating Both Expert Users and Novice Users in One Interface by Utilizing Multi-layer Interface in Complex Function Products (TKPH, HYY), pp. 159–165.
- IDGD-2011-LuL #case study
- A Study of Producing Ceramic Glaze Utilizing Shihmen Reservoir Silt (CCL, PHL), pp. 201–210.
- ICEIS-J-2011-GuLZWLSLW #enterprise #evaluation #generative #information management #process #safety
- Intelligent Information Acquisition and Utilization in Safety Evaluation Decision Making Process of Power Generation Enterprises (DxG, CyL, JZ, JW, WL, JS, WL, YW), pp. 162–177.
- ICEIS-v4-2011-AlgarniCL #case study #towards
- Towards an Explanatory Model of eMarketplaces Utilization — A Case Study of Saudi Arabia (FA, YC, VCSL), pp. 63–75.
- CIKM-2011-OzertemVL #set #using
- Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
- CIKM-2011-XueKRP
- Utility-driven anonymization in data publishing (MX, PK, CR, HKP), pp. 2277–2280.
- KDD-2011-Gkoulalas-DivanisL
- Revisiting sequential pattern hiding to enhance utility (AGD, GL), pp. 1316–1324.
- KDIR-2011-PaliwalP #clustering #documentation #proximity
- Utilizing Term Proximity based Features to Improve Text Document Clustering (SP, VP), pp. 537–544.
- KEOD-2011-HlomaniGKS #case study #composition #evaluation #framework #ontology
- Utilizing a Compositional System Knowledge Framework for Ontology Evaluation — A Case Study on BioSTORM (HH, MGG, DK, DAS), pp. 167–175.
- RecSys-2011-WangSS #e-commerce #recommendation
- Utilizing related products for post-purchase recommendation in e-commerce (JW, BS, NS), pp. 329–332.
- SIGIR-2011-Carterette #concept #effectiveness #framework #modelling
- System effectiveness, user models, and user utility: a conceptual framework for investigation (BC), pp. 903–912.
- SIGIR-2011-JainOV #query #web
- Synthesizing high utility suggestions for rare web search queries (AJ, UO, EV), pp. 805–814.
- SIGIR-2011-KrikonK #ad hoc #feedback #retrieval
- Utilizing minimal relevance feedback for ad hoc retrieval (EK, OK), pp. 1099–1100.
- SIGIR-2011-LinZD #approximate #documentation #optimisation
- Best document selection based on approximate utility optimization (HHL, YZ, JD), pp. 1215–1216.
- SIGIR-2011-Tyler #behaviour #multi #persistent #personalisation
- Persistence in the ephemeral: utilizing repeat behaviors for multi-session personalized search (SKT), pp. 1311–1312.
- SIGIR-2011-WangZ #e-commerce #recommendation
- Utilizing marginal net utility for recommendation in e-commerce (JW, YZ), pp. 1003–1012.
- MoDELS-2011-RamirezC #automation #monitoring #requirements
- Automatic Derivation of Utility Functions for Monitoring Software Requirements (AJR, BHCC), pp. 501–516.
- MoDELS-2011-RamirezC #automation #monitoring #requirements
- Automatic Derivation of Utility Functions for Monitoring Software Requirements (AJR, BHCC), pp. 501–516.
- SAC-2011-GuerraF #realtime #resource management
- Handling overload of target sensitive real-time applications for increased system utility and improved resource usage (RG, GF), pp. 742–747.
- ICSE-2011-NohrerRE #consistency #effectiveness #nondeterminism
- Positive effects of utilizing relationships between inconsistencies for more effective inconsistency resolution (AN, AR, AE), pp. 864–867.
- CGO-2011-SondagR #manycore #symmetry
- Phase-based tuning for better utilization of performance-asymmetric multicore processors (TS, HR), pp. 11–20.
- CASE-2010-ParkB
- Utility-based dynamic control of batch processing systems (HP, AB), pp. 439–444.
- DAC-2010-VeetilCSB #monte carlo #performance #resource management
- Efficient smart monte carlo based SSTA on graphics processing units with improved resource utilization (VV, YHC, DS, DB), pp. 793–798.
- HT-2010-BeelG10a #mindmap
- Enhancing search applications by utilizing mind maps (JB, BG), pp. 303–304.
- PODS-2010-KiferL #axiom #privacy #statistics #towards
- Towards an axiomatization of statistical privacy and utility (DK, BRL), pp. 147–158.
- VLDB-2010-ChaytorW #privacy
- Small Domain Randomization: Same Privacy, More Utility (RC, KW), pp. 608–618.
- VLDB-2010-CormodeLLS
- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
- VLDB-2010-McConnellPH #approach #named #performance #reliability #replication
- iFlow: An Approach for Fast and Reliable Internet-Scale Stream Processing Utilizing Detouring and Replication (CM, FP, JHH), pp. 1557–1560.
- CSMR-2010-MyersSS #debugging #scalability
- Utilizing Debug Information to Compact Loops in Large Program Traces (DM, MADS, MS), pp. 41–50.
- ICPC-2010-RatiuH #program analysis #web
- Utilizing Web Search Engines for Program Analysis (DR, LH), pp. 94–103.
- WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
- PLDI-2010-XuMARSS #data type
- Finding low-utility data structures (G(X, NM, MA, AR, ES, GS), pp. 174–186.
- CHI-2010-ChengLCLK #named
- iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers (KYC, RHL, BYC, RHL, SYK), pp. 1155–1164.
- CIKM-2010-QianCXQ #how
- How about utilizing ordinal information from the distribution of unlabeled data (MQ, BC, HX, HQ), pp. 289–298.
- CIKM-2010-ShiN #dependence #using
- Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
- CIKM-2010-TylerWZ #information retrieval #personalisation
- Utilizing re-finding for personalized information retrieval (SKT, JW, YZ), pp. 1469–1472.
- CIKM-2010-YilmazSCR #evaluation #web
- Expected browsing utility for web search evaluation (EY, MS, NC, SR), pp. 1561–1564.
- ICPR-2010-SchelsS #approach #classification #image #multi #sequence
- A Multiple Classifier System Approach for Facial Expressions in Image Sequences Utilizing GMM Supervectors (MS, FS), pp. 4251–4254.
- KDD-2010-TsengWSY #algorithm #mining #named #performance
- UP-Growth: an efficient algorithm for high utility itemset mining (VST, CWW, BES, PSY), pp. 253–262.
- RecSys-2010-Said #hybrid #identification #recommendation
- Identifying and utilizing contextual data in hybrid recommender systems (AS), pp. 365–368.
- SAC-2010-BautistaSHPD #clustering #power management #requirements #set
- Dynamic task set partitioning based on balancing resource requirements and utilization to reduce power consumption (DB, JS, HH, SP, JD), pp. 521–526.
- SAC-2010-ShieTY #data type #mining #online
- Online mining of temporal maximal utility itemsets from data streams (BES, VST, PSY), pp. 1622–1626.
- CASE-2009-Srinivasan #communication
- Sustaining manufacturing assets through smarter utilization of information and communication technologies (VS), pp. 478–482.
- DAC-2009-UzelacM #realtime
- A real-time program trace compressor utilizing double move-to-front method (VU, AM), pp. 738–743.
- ICDAR-2009-KimRLK #consistency #recognition
- Utilizing Consistency Context for Handwritten Mathematical Expression Recognition (KK, THR, JSL, JHK), pp. 1051–1055.
- STOC-2009-GhoshRS #privacy
- Universally utility-maximizing privacy mechanisms (AG, TR, MS), pp. 351–360.
- HCD-2009-Yamazaki #approach #design #prototype
- Approach to Human Centered Design Innovation by Utilized Paper Prototyping (KY), pp. 367–373.
- HCI-AUII-2009-WelchLLWSW #artificial reality #interactive #paradigm #social
- An Affect-Sensitive Social Interaction Paradigm Utilizing Virtual Reality Environments for Autism Intervention (KCW, UL, CL, RW, NS, ZW), pp. 703–712.
- HCI-VAD-2009-KashiwagiXSKO #learning #physics #process
- A Language Learning System Utilizing RFID Technology for Total Physical Response Activities (HK, YX, YS, MK, KO), pp. 119–128.
- HIMI-DIE-2009-KawashimoSDAT
- A Skill Transfer Method for Manual Machine Tool Operation Utilizing Cutting Sound (TK, NS, DD, MA, TT), pp. 77–86.
- ICEIS-AIDSS-2009-BiscarriMLGBM #detection #framework #mining
- A Mining Framework to Detect Non-technical Losses in Power Utilities (FB, IM, CL, JIG, JB, RM), pp. 96–101.
- ICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #using #xml
- A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
- ICEIS-SAIC-2009-TruongMLBCDGKLMMPSW #enterprise
- Email-based Interoperability Service Utilities for Cooperative Small and Medium Enterprises (HLT, EM, ML, TB, MC, CD, PG, KK, DLL, CAM, CM, AP, MS, DW), pp. 95–101.
- CIKM-2009-KrikonKB #ranking
- Utilizing inter-passage and inter-document similarities for re-ranking search results (EK, OK, MB), pp. 1597–1600.
- ECIR-2009-YiA #case study #comparative #information retrieval #modelling #topic
- A Comparative Study of Utilizing Topic Models for Information Retrieval (XY, JA), pp. 29–41.
- KDD-2009-DuFWA #communication #generative #network #scalability
- Large human communication networks: patterns and a utility-driven generator (ND, CF, BW, LA), pp. 269–278.
- KDD-2009-Last #data mining #mining
- Improving data mining utility with projective sampling (ML), pp. 487–496.
- KDD-2009-LiL #on the #privacy #trade-off
- On the tradeoff between privacy and utility in data publishing (TL, NL), pp. 517–526.
- KDIR-2009-Weichselbraun #approach #optimisation
- A Utility Centered Approach for Evaluating and Optimizing Geo-tagging (AW), pp. 134–139.
- REFSQ-2009-KhurumGAF #empirical #requirements
- A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
- SAC-2009-MasaruS #algorithm #modelling #search-based
- Daily demand forecasting of new products utilizing diffusion models and genetic algorithms (TM, MS), pp. 1106–1107.
- PPoPP-2009-YangWXDZ #graph #optimisation
- Comparability graph coloring for optimizing utilization of stream register files in stream processors (XY, LW, JX, YD, YZ), pp. 111–120.
- SIGMOD-2008-PanZW #clustering #composition #dataset #matrix #named #performance #scalability
- CRD: fast co-clustering on large datasets utilizing sampling-based matrix decomposition (FP, XZ, WW), pp. 173–184.
- CHI-2008-ShenoyT #image
- Human-aided computing: utilizing implicit human processing to classify images (PS, DST), pp. 845–854.
- ICEIS-AIDSS-2008-BiscarriMLGBM #data mining #mining #variability
- A Data Mining Method Based on the Variability of the Customer Consumption — A Special Application on Electric Utility Companies (FB, IM, CL, JIG, JB, RM), pp. 370–374.
- ICEIS-AIDSS-2008-LamKL #knowledge-based #metric #performance #resource management
- A Knowledge-Based Performance Measurement System for Improving Resource Utilization (ACYL, SKK, WBL), pp. 187–192.
- CIKM-2008-OzcanAU #query
- Utilization of navigational queries for result presentation and caching in search engines (RO, ISA, ÖU), pp. 1499–1500.
- ECIR-2008-BenderskyK #documentation #modelling #retrieval
- Utilizing Passage-Based Language Models for Document Retrieval (MB, OK), pp. 162–174.
- KDD-2008-BrickellS #cost analysis #privacy
- The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
- SEKE-2008-DebOP #deployment #distributed #self
- Self-managed Deployment in a Distributed Environment via Utility Functions (DD, MJO, JP), pp. 808–813.
- SIGIR-2008-LinS #automation #evaluation #how #simulation #towards
- How do users find things with PubMed?: towards automatic utility evaluation with user simulations (JJL, MDS), pp. 19–26.
- SIGIR-2008-XuDW #dependence #semantics
- Utilizing phrase based semantic information for term dependency (YX, FD, BW), pp. 855–856.
- ECMDA-FA-2008-FritzscheGFSKB #analysis #modelling #performance #towards
- Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
- SAC-2008-Andersson #bound #scheduling
- The utilization bound of uniprocessor preemptive slack-monotonic scheduling is 50% (BA), pp. 281–283.
- CASE-2007-LeungG #behaviour #locality #multi
- Multi-Robot Localization and Mapping Strategy: Utilizing Behavior Based Dynamic Tree Structure and Observer-explorer Routine (KKKL, GG), pp. 881–886.
- DATE-2007-FaragES #2d #configuration management #using
- Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
- DATE-2007-HungIGS #fault
- Utilization of SECDED for soft error and variation-induced defect tolerance in caches (LDH, HI, MG, SS), pp. 1134–1139.
- HT-2007-ZhouGTB #automation #generative #hypermedia #modelling #named
- LLAMA: automatic hypertext generation utilizing language models (DZ, JG, MT, TJB), pp. 77–80.
- ICDAR-2007-HickinbothamC #knowledge-based #recognition
- Knowledge-Based Recognition of Utility Map Sub-Diagrams (SJH, AGC), pp. 213–217.
- VLDB-2007-LeeZL #approach #concurrent #distributed #integration #query #throughput
- Request Window: an Approach to Improve Throughput of RDBMS-based Data Integration System by Utilizing Data Sharing Across Concurrent Distributed Queries (RL, MZ, HL), pp. 1219–1230.
- VLDB-2007-RastogiHS #bound #privacy
- The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
- CHI-2007-GluckBM
- Matching attentional draw with utility in interruption (JG, AB, JM), pp. 41–50.
- HCI-IDU-2007-ResterPWHMPO #evaluation #interactive
- Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
- HCI-IDU-2007-WideroosP #empirical #research
- Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research (KW, SP), pp. 976–984.
- AdaEurope-2007-WellingsB #ada #realtime
- Real-Time Utilities for Ada 2005 (AJW, AB), pp. 1–14.
- CIKM-2007-MelucciW #feedback #geometry
- Utilizing a geometry of context for enhanced implicit feedback (MM, RWW), pp. 273–282.
- ECIR-2007-BettsMO #classification #information management
- The Utility of Information Extraction in the Classification of Books (TB, MM, JO), pp. 295–306.
- SIGIR-2007-DingL #mining
- The utility of linguistic rules in opinion mining (XD, BL), pp. 811–812.
- SIGIR-2007-YangLLHKR #documentation
- Utility-based information distillation over temporally sequenced documents (YY, AL, NL, AH, BK, MR), pp. 31–38.
- ICSE-2007-Ludi #requirements
- Introducing Accessibility Requirements through External Stakeholder Utilization in an Undergraduate Requirements Engineering Course (SL), pp. 736–743.
- ICSE-2007-NgCCY #design pattern #effectiveness #maintenance #question
- Do Maintainers Utilize Deployed Design Patterns Effectively? (THN, SCC, WKC, YTY), pp. 168–177.
- HPDC-2007-LeeS #analysis #performance #precise
- Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
- ASE-2006-Maurer #assembly
- The Rearranger — A New Assembler Utility (WDM), pp. 357–358.
- SIGMOD-2006-KiferG #dataset #injection
- Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
- STOC-2006-Feige #on the
- On maximizing welfare when utility functions are subadditive (UF), pp. 41–50.
- CHI-2006-PrabakerBC #authoring #documentation #evaluation #programming #using
- An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
- CHI-2006-RanjanBC
- Searching in audio: the utility of transcripts, dichotic presentation, and time-compression (AR, RB, MHC), pp. 721–730.
- ICEIS-AIDSS-2006-Zenzerovic #reasoning
- Utilization of Case-Based Reasoning in Auditing — Determining the Audit Fee (RZ), pp. 182–188.
- ICEIS-DISI-2006-OommenC #database #on the #optimisation #query
- On Utilizing Attribute Cardinality Maps to Enhance Query Optimization in the Oracle Database System (BJO, JC), pp. 23–35.
- ICEIS-J-2006-OommenC06a #database #on the #optimisation #query
- On Enhancing Query Optimization in the Oracle Database System by Utilizing Attribute Cardinality Maps (BJO, JC), pp. 38–71.
- CIKM-2006-ZhangV
- Utility scoring of product reviews (ZZ, BV), pp. 51–57.
- ICPR-v2-2006-DagliRH #information management
- Utilizing Information Theoretic Diversity for SVM Active Learn (CKD, SR, TSH), pp. 506–511.
- ICPR-v2-2006-IlonenPKK #classification
- Gaussian mixture pdf in one-class classification: computing and utilizing confidence values (JI, PP, JKK, HK), pp. 577–580.
- ICPR-v3-2006-WangL06a #adaptation #image #persistent
- Adaptive Persistence Utilizing Motion Compensation for Ultrasound Images (GW, DCL), pp. 726–729.
- KDD-2006-XuWPWSF #using
- Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
- SIGIR-2006-KurlandL #clustering #exclamation #modelling
- Respect my authority!: HITS without hyperlinks, utilizing cluster-based language models (OK, LL), pp. 83–90.
- SAC-2006-ChoRJ #embedded #on the #realtime #scheduling
- On utility accrual processor scheduling with wait-free synchronization for embedded real-time software (HC, BR, EDJ), pp. 918–922.
- HPDC-2006-AuYoungRWW #contract
- Service contracts and aggregate utility functions (AA, LR, SW, JW), pp. 119–131.
- DATE-2005-WuRJ #energy #realtime #scheduling
- Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model (HW, BR, EDJ), pp. 474–479.
- ICSM-2005-WhiteJR #object-oriented #testing
- Utilization of Extended Firewall for Object-Oriented Regression Testing (LJW, KJ, BR), pp. 695–698.
- MLDM-2005-DuKAB #algorithm #clustering #encoding #multi #search-based
- Alternative Clustering by Utilizing Multi-objective Genetic Algorithm with Linked-List Based Chromosome Encoding (JD, EEK, RA, KB), pp. 346–355.
- SIGIR-2005-Hosanagar #approach #distributed #information retrieval
- A utility theoretic approach to determining optimal wait times in distributed information retrieval (KH), pp. 91–97.
- SIGIR-2005-WhiteRJ #case study #feedback
- A study of factors affecting the utility of implicit relevance feedback (RWW, IR, JMJ), pp. 35–42.
- RE-2005-Cleland-HuangSDZ #requirements #traceability
- Utilizing Supporting Evidence to Improve Dynamic Requirements Traceability (JCH, RS, CD, XZ), pp. 135–144.
- SAC-2005-FeizabadiRJ #algorithm #named #scheduling
- MSA: a memory-aware utility accrual scheduling algorithm (SF, BR, EDJ), pp. 857–862.
- ESEC-FSE-2005-Sherriff #fault #validation #verification
- Utilizing verification and validation certificates to estimate software defect density (MS), pp. 381–384.
- SAT-2005-LewisSB #satisfiability
- Speedup Techniques Utilized in Modern SAT Solvers (MDTL, TS, BB), pp. 437–443.
- DATE-DF-2004-ChenLHBB #design #network
- Utilizing Formal Assertions for System Design of Network Processors (XC, YL, HH, LNB, FB), pp. 126–133.
- DATE-v2-2004-NakashimaIOM
- ULSI Interconnect Length Distribution Model Considering Core Utilization (HN, JI, KO, KM), pp. 1210–1217.
- SIGMOD-2004-DarHS #database #towards
- dbSwitch™ — Towards a Database Utility (SD, GH, ES), pp. 892–896.
- ICALP-2004-CodenottiV #equilibrium #performance
- Efficient Computation of Equilibrium Prices for Markets with Leontief Utilities (BC, KRV), pp. 371–382.
- CHI-2004-JackoBKMEES #feedback #multimodal #visual notation
- Isolating the effects of visual impairment: exploring the effect of AMD on the utility of multimodal feedback (JAJ, LB, TK, KPM, PJE, VKE, FS), pp. 311–318.
- ICEIS-v1-2004-CavalieriDFR #middleware #scalability
- A Middleware for the Management of Large Utilities Plants (SC, FD, CF, AR), pp. 99–104.
- ICEIS-v1-2004-DimassiSR #concept #implementation
- The Concept and Implementation of the Market Place E-Utilities*COM (JD, CS, CR), pp. 337–347.
- CIKM-2004-SiC #framework
- Unified utility maximization framework for resource selection (LS, JPC), pp. 32–41.
- ICML-2004-WierstraW #markov #modelling
- Utile distinction hidden Markov models (DW, MW).
- ICPR-v3-2004-MiyoshiLKYN #automation #geometry
- Automatic Extraction of Buildings Utilizing Geometric Features of a Scanned Topographic Map (TM, WL, KK, HY, EN), pp. 626–629.
- KR-2004-GonzalesP #elicitation #network
- GAI Networks for Utility Elicitation (CG, PP), pp. 224–234.
- SIGIR-2004-LiuLYM #approach #documentation #effectiveness #retrieval
- An effective approach to document retrieval via utilizing WordNet and recognizing phrases (SL, FL, CTY, WM), pp. 266–272.
- SAC-2004-Binemann-Zdanowicz #named #towards
- SiteLang: : Edu: towards a context-driven e-learning content utilization model (ABZ), pp. 924–928.
- SAC-2004-GossnerMS #development #interface #java
- Interface utilization in the Java Development Kit (JG, PM, FS), pp. 1310–1315.
- HPDC-2004-KramerM #grid #using
- Utilization of a Local Grid of Mac OS X-Based Computers using Xgrid (DAK, MM), pp. 264–265.
- DAC-2003-ChoiK #design #embedded #layout #memory management #performance
- Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
- ICEIS-v3-2003-AkatsuKK #analysis #parametricity
- Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
- CIKM-2003-RadevT #evaluation #summary #using
- Summarization evaluation using relative utility (DRR, DT), pp. 508–511.
- ICML-2003-FanLM
- Utilizing Domain Knowledge in Neuroevolution (JF, RL, RM), pp. 170–177.
- ICML-2003-KennedyJ #learning #problem
- Characteristics of Long-term Learning in Soar and its Application to the Utility Problem (WGK, KADJ), pp. 337–344.
- KDD-2003-BarryZM #architecture #information management #simulation
- Architecting a knowledge discovery engine for military commanders utilizing massive runs of simulations (PSB, JZ, MM), pp. 699–704.
- POPL-2003-BaconCR #consistency #garbage collection #realtime
- A real-time garbage collector with low overhead and consistent utilization (DFB, PC, VTR), pp. 285–298.
- HPDC-2003-JiangX #architecture #named #on-demand
- SODA: A Service-On-Demand Architecture for Application Service Hosting Utility Platforms (XJ, DX), pp. 174–183.
- DAC-2002-AbbaspourZ
- Retargetable binary utilities (MA, JZ), pp. 331–336.
- SEKE-2002-RaffoHV #framework #hybrid #metric #modelling #process #trade-off #using
- Software process decision support: making process tradeoffs using a hybrid metrics, modeling and utility framework (DR, WH, JV), pp. 803–809.
- HPDC-2002-Plale #data type #memory management #runtime
- Leveraging Run Time Knowledge about Event Rates to Improve Memory Utilization in Wide Area Data Stream Filtering (BP), pp. 171–178.
- TestCom-2002-EbnerYL
- A Definition and Utilization of OMG IDL to TTCN-3 Mappings (ME, AY, ML), p. 443–?.
- DAC-2001-Gebotys #embedded #memory management
- Utilizing Memory Bandwidth in DSP Embedded Processors (CHG), pp. 347–352.
- ITiCSE-2001-Ginat #algorithm #learning #problem
- Metacognitive awareness utilized for learning control elements in algorithmic problem solving (DG), pp. 81–84.
- ICML-2001-ChajewskaKO #behaviour #learning
- Learning an Agent’s Utility Function by Observing Behavior (UC, DK, DO), pp. 35–42.
- ICML-2001-SchefferW #incremental #information management #problem
- Incremental Maximization of Non-Instance-Averaging Utility Functions with Applications to Knowledge Discovery Problems (TS, SW), pp. 481–488.
- SIGIR-2001-FranzMWZ01a #corpus #parallel
- Quantifying the Utility of Parallel Corpora (MF, JSM, TW, WJZ), pp. 398–399.
- ESEC-FSE-2001-ConradiD #empirical #experience
- An empirical study on the utility of formal routines to transfer knowledge and experience (RC, TD), pp. 268–276.
- SOSP-2001-RowstronD #peer-to-peer #persistent #scalability
- Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility (AITR, PD), pp. 188–201.
- ITiCSE-2000-BarrosP
- A versatile assignment in CS 2(poster session): a file compression utility based on the Huffman code (JPB, RP), p. 185.
- ICPR-v1-2000-KamijoMIS #markov #random #robust
- Occlusion Robust Tracking Utilizing Spatio-Temporal Markov Random Field Model (SK, YM, KI, MS), pp. 1140–1144.
- KDD-2000-SchefferW #algorithm
- A sequential sampling algorithm for a general class of utility criteria (TS, SW), pp. 330–334.
- TOOLS-USA-2000-WolfIBP #modelling #object-oriented #tool support #uml
- UML Tool Support: Utilization of Object-Oriented Models (MW, EI, RB, IP), pp. 529–534.
- ASPLOS-2000-KawahitoKN #effectiveness #hardware #null #pointer
- Effective Null Pointer Check Elimination Utilizing Hardware Trap (MK, HK, TN), pp. 139–149.
- OSDI-2000-LumbSGNR #towards
- Towards Higher Disk Head Utilization: Extracting “Free” Bandwidth from Busy Disk Drives (CRL, JS, GRG, DN, ER), pp. 87–102.
- PODS-1999-ChuHS #optimisation #query
- Least Expected Cost Query Optimization: An Exercise in Utility (FCC, JYH, PS), pp. 138–147.
- HCI-CCAD-1999-NumanoMTMNFM #fault #reduction
- Reduction of human errors in plant operation utilizing human error correction function as an individual and crew (MN, KM, KT, HM, YN, JF, YM), pp. 1206–1210.
- HCI-EI-1999-SundareswaranBCW #3d #artificial reality #distributed #recognition #speech
- A Distributed System for Device Diagnostics Utilizing Augmented Reality, 3D Audio, and Speech Recognition (VS, RB, SC, KW), pp. 466–470.
- SEKE-1999-AlthoffBHMNST #maintenance #repository #reuse
- Systematic Population, Utilization, and Maintenance of a Repository for Comprehensive Reuse (KDA, AB, SH, WM, MN, DS, CT), pp. 25–50.
- SEKE-1999-Giaever #information management
- Collecting, Storing and Utilizing Information about Improvement Opportunities: A Discussion of the Non-Technological Barriers to Success (HMG), pp. 205–209.
- SIGMOD-1998-ChaudhuriN #analysis
- AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
- TAGT-1998-Rudolf #constraints #graph #pattern matching #performance
- Utilizing Constraint Satisfaction Techniques for Efficient Graph Pattern Matching (MR), pp. 238–251.
- CIKM-1998-Horvitz #policy
- Continual Computation Policies for Utility-Directed Prefetching (EH), pp. 175–184.
- HPDC-1998-AndersenA #case study #clustering #implementation #multi
- Implementation and Utilization of a Heterogeneous Multicomputer Cluster for the Study of Load Balancing Strategies (PHA, JKA), pp. 362–363.
- HPDC-1998-DiwanG #adaptation #approach #communication
- Adaptive Utilization of Communication and Computational Resources in High-Performance Distribution Systems: The EMOP Approach (SD, DG), pp. 2–9.
- HPDC-1998-JuddCS #approach
- The DOGMA Approach to High-Utilization Supercomputing (GJ, MJC, QS), pp. 64–70.
- EDTC-1997-PandaDN #embedded #memory management #performance
- Efficient utilization of scratch-pad memory in embedded processor applications (PRP, NDD, AN), pp. 7–11.
- ICDAR-1997-VossepoelSD #memory management #performance
- Memory efficient skeletonization of utility maps (AMV, KS, CFPD), pp. 797–800.
- CSEET-1997-SchlimmerH #modelling #re-engineering
- Utilizing Corporate Models in a Software Engineering Studio (JCS, JRH), pp. 185–191.
- HCI-CC-1997-Al-KhaldiA #empirical
- Computer Utilization and Attitude: Empirical Evidence from Saudi Arabia (MAAK, IMAJ), pp. 785–788.
- HCI-SEC-1997-ZanottiRC
- Human Factors Principles for Variable Message Signs Utilized in Intelligent Transportation Systems (AZ, MLR, GC), pp. 339–342.
- SAC-1997-ChundiRR #database #distributed #multi #transaction
- Multi-site distributed database transactions utilizing deferred update (PC, DJR, SSR), pp. 118–122.
- SAC-1997-MortonB #mobile
- Utilizing mobile computing in the Wishard Memorial Hospital ambulatory service (SM, OAB), pp. 287–294.
- HPDC-1997-KimL #distributed #network #parallel
- Utilizing Heterogeneous Networks in Distributed Parallel Computing Systems (JK, DJL), pp. 336–345.
- WIA-1996-Noord #automaton #finite
- FSA Utilities: A Toolbox to Manipulate Finite-State Automata (GvN), pp. 87–108.
- ICPR-1996-SauvolaP #composition #documentation #interface
- A document management interface utilizing page decomposition and content-based compression (JJS, MP), pp. 752–757.
- KR-1996-BacchusG #independence
- Utility Independence in a Qualitative Decision Theory (FB, AJG), pp. 542–552.
- ICDAR-v1-1995-NakajimaY #automation #database #recognition
- Automatic recognition of facility drawings and street maps utilizing the facility management database (CN, TY), pp. 516–519.
- ICML-1995-McCallum #learning
- Instance-Based Utile Distinctions for Reinforcement Learning with Hidden State (AM), pp. 387–395.
- SAC-1995-VagelatosTTC
- Utilization of a lexicon for spelling correction in modern Greek (AV, TT, CT, DC), pp. 267–271.
- HPCA-1995-McKeeW
- Access Ordering and Memory-Conscious Cache Utilization (SAM, WAW), pp. 253–262.
- CAV-1995-EmersonS #approach #model checking #symmetry
- Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automata-theoretic Approach (EAE, APS), pp. 309–324.
- DAC-1994-PotkonjakD #optimisation #resource management #testing #using
- Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
- VLDB-1994-NgY #on-demand
- Maximizing Buffer and Disk Utilizations for News On-Demand (RTN, JY), pp. 451–462.
- CSCW-1994-KrautRCF #communication #social
- Life and Death of New Technology: Task, Utility and Social Influences on the Use of a Communication Medium (REK, RER, CC, RSF), pp. 13–21.
- CAiSE-1994-Keszenheimer #abstraction #behaviour #evolution #maintenance
- Utilizing Behavioral Abstractions to Facilitate Maintenance During Class Evolution (LMK), pp. 325–338.
- DAC-1993-KimL #multi #synthesis
- Utilization of Multiport Memories in Data Path Synthesis (TK, CLL), pp. 298–302.
- HT-1993-SaltonA #traversal
- Selective Text Utilization and Text Traversal (GS, JA), pp. 131–144.
- ICDAR-1993-CaesarGM93a #adaptation #classification #scalability #set
- Utilization of large disordered sample sets for classifier adaptation in complex domains (TC, JMG, EM), pp. 790–793.
- ICDAR-1993-NakamuraFN #comprehension #diagrams #natural language
- Diagram understanding utilizing natural language text (YN, RF, MN), pp. 614–618.
- HCI-SHI-1993-Jones #3d #diagrams #estimation #information management
- 3-D Diagrams for Knowledge Engineering: An Early Estimation of Utility (SJ), pp. 561–566.
- ICML-1993-McCallum #memory management
- Overcoming Incomplete Perception with Util Distinction Memory (AM), pp. 190–196.
- SEKE-1993-YoshitakaHI #framework #query
- A Framework for Query Processing Utilizing Knowledge (AY, MH, TI), pp. 1–10.
- TOOLS-USA-1993-WhiteW #information management #object-oriented #question
- Utilization of Object-Oriented Technology in Mainstream Information Systems: if not now, when? (KW, EW), pp. 497–498.
- DAC-1992-HamadaCC #equation #estimation
- A Wire Length Estimation Technique Utilizing Neighborhood Density Equations (TH, CKC, PMC), pp. 57–61.
- KR-1992-HaddawyH
- Representations for Decision-Theoretic Planning: Utility Functions for Deadline Goals (PH, SH), pp. 71–82.
- ML-1992-LiuS #natural language
- Augmenting and Efficiently Utilizing Domain Theory in Explanation-Based Natural Language Acquisition (RLL, VWS), pp. 282–289.
- ML-1992-SubramanianH #algorithm #design
- Measuring Utility and the Design of Provably Good EBL Algorithms (DS, SH), pp. 426–425.
- DAC-1991-ChewS #logic #multi #simulation
- Utilizing Logic Information in Multi-Level Timing Simulation (MPC, AJS), pp. 215–218.
- CAiSE-1991-Chung #design #information management #non-functional #representation #requirements
- Representation and Utilization of Non-Functional Requirements for Information System Design (LC), pp. 5–30.
- KR-1991-ProvanP
- The Utility of Consistency-Based Diagnostic Techniques (GMP, DLP), pp. 461–472.
- ASPLOS-1991-CmelikKDK #analysis #benchmark #metric #set #specification
- An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
- DAC-1990-KatsadasK #multi
- A Multi-Layer Router Utilizing Over-Cell Areas (EK, EK), pp. 704–708.
- VLDB-1990-DrewKH #algorithm #implementation #performance
- The Performance and Utility of the Cactis Implementation Algorithms (PD, RK, SEH), pp. 135–147.
- CHI-1990-TuckO
- Help by guided tasks: utilizing UIMS knowledge (RT, DRO), pp. 71–78.
- ML-1990-CarlsonWF #concept #induction
- Search Control, Utility, and Concept Induction (BMC, JBW, DHF), pp. 85–92.
- ML-1990-Cohen90a #approximate #learning
- Learning Approximate Control Rules of High Utility (WWC), pp. 268–276.
- ML-1990-Holder #machine learning #problem
- The General Utility Problem in Machine Learning (LBH), pp. 402–410.
- PODS-1989-JohnsonS
- Utilization of B-trees with Inserts, Deletes and Modifies (TJ, DS), pp. 235–246.
- PODS-1989-KedemT #behaviour #database #modelling #relational
- Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models (ZMK, AT), pp. 336–346.
- SIGMOD-1989-Christodoulakis #performance #retrieval
- Retrieval Performance Versus Disc Space Utilization on WORM Optical Discs (SC, DAF), pp. 306–314.
- VLDB-1989-MurphyR #effectiveness #execution #multi #resource management
- Effective Resource Utilization for Multiprocessor Join Execution (MCM, DR), pp. 67–75.
- ML-1989-Kokar #concept #embedded
- Concept Discovery Through Utilization of Invariance Embedded in the Description Language (MMK), pp. 478–479.
- ML-1988-EricksonZ #experience
- Utilizing Experience for Improving the Tactical Manager (MDE, JMZ), pp. 444–450.
- SIGIR-1988-BollmannR #analysis
- A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
- PPEALS-1988-GuptaS #parallel #performance
- Compile-time Techniques for Efficient Utilization of Parallel Memories (RG, MLS), pp. 235–246.
- DAC-1986-KnappP #design
- A design utility manager: the ADAM planning engine (DK, ACP), pp. 48–54.
- SIGMOD-1983-KambayashiY #composition #dependence #query
- Query Processing Utilizing Dependencies and Horizontal Decomposition (YK, MY), pp. 55–67.
- SIGIR-1980-SaltonW #modelling
- A Term Weighting Model Based on Utility Theory (GS, HW), pp. 9–22.
- VLDB-1978-FoucautR #concept #design #information management
- Concepts for Design of an Information System Conceptual Schema and its Utilization in the REMORA Project (OF, CR), pp. 342–350.
- VLDB-1978-NakamuraM #analysis
- An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
- DAC-1977-Christley #design #interactive
- Thick film substrate (Micropackage) design utilizing interactive Computer Aided Design systems (FMC), pp. 450–459.
- SOSP-1973-DayH #interactive #named #operating system
- ARGOS: An Operating System for a Computer Utility Supporting Interactive Instrument Control (PD, JH), pp. 28–37.
- DAC-1972-McClure #fault #logic #simulation
- Fault simulation of digital logic utilizing a small host machine (RMM), pp. 104–110.
- SIGIR-1971-Katcher #performance
- Efficient Utilization of Limited Access Archival Storage in a Time Shared Environment (AMK), pp. 197–205.
- DAC-1968-KadisTVHG #layout #source code
- Building block programs for the layout of printed circuit boards utilizing integrated circuit packs (DAPSYS V.2) (RWK, KLT, WJVJ, WLH, CEG).
- SOSP-1967-Graham68 #information management
- Protection in an information processing utility (RMG), pp. 365–369.