Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Abstract. We have designed and implemented an interprocedural algorithm to analyze symbolic value ranges that can be assumed by variables at any given point in a program. Our algor...
This paper describes a data set collected by MIT's autonomous vehicle Talos during the 2007 DARPA Urban Challenge. Data from a high precision navigation system, 5 cameras, 12 ...
Albert S. Huang, Matthew E. Antone, Edwin Olson, L...
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...