Sciweavers

1621 search results - page 128 / 325
» Detecting Experiences from Weblogs
Sort
View
SIGSOFT
2007
ACM
16 years 4 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 6 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
126
Voted
CIKM
2008
Springer
15 years 6 months ago
Achieving both high precision and high recall in near-duplicate detection
To find near-duplicate documents, fingerprint-based paradigms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches a...
Lian'en Huang, Lei Wang, Xiaoming Li
CVIU
2007
174views more  CVIU 2007»
15 years 4 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
71
Voted
ICC
2007
IEEE
15 years 10 months ago
A Proposal of Finger Identification Scheme Employing Intra-Body Communications
—The Intra-Body Communication method attracted more attention since the development of ubiquitous communication. IBC is the technology to use the human body as communication tran...
Nao Kobayashi, Jordi Agud Ruiz, Shigeru Shimamoto