Code clones are similar program structures recurring in software systems. Clone detectors produce much information and a challenge is to identify useful clones depending on the go...
Yali Zhang, Hamid Abdul Basit, Stan Jarzabek, Dang...
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
Most graph visualization techniques focus on the structure of graphs and do not offer support for dealing with node attributes and edge labels. To enable users to detect relations...
In this paper, we introduce the use of nonlinear dimension reduction for the analysis of functional neuroimaging datasets. Using a Laplacian Embedding approach, we show the power ...
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...