Sciweavers

11017 search results - page 2093 / 2204
» Closure Systems and their Structure
Sort
View
SIGSOFT
2007
ACM
16 years 5 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
SIGSOFT
2003
ACM
16 years 5 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam
125
Voted
ISBI
2008
IEEE
16 years 5 months ago
Quantitative genetic modeling of lateral ventricular shape and volume using multi-atlas fluid image alignment in twins
Despite substantial progress in measuring the 3D profile of anatomical variations in the human brain, their genetic and environmental causes remain enigmatic. We developed an auto...
Yi-Yu Chou, Natasha Lepore, Marina Barysheva, Ming...
220
Voted
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 5 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
WWW
2009
ACM
16 years 5 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...
« Prev « First page 2093 / 2204 Last » Next »