Sciweavers

1636 search results - page 7 / 328
» Detecting similar software applications
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Detecting phases in parallel applications on shared memory architectures
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Erez Perelman, Marzia Polito, Jean-Yves Bouguet, J...
ICASSP
2010
IEEE
13 years 8 months ago
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images
Image spam is an email spam that embeds text content into graphical images to bypass traditional spam filters. The majority of previous approaches focus on filtering image spam ...
Yan Gao, Alok N. Choudhary, Gang Hua
ECCV
2008
Springer
13 years 10 months ago
Shape-Based Retrieval of Heart Sounds for Disease Similarity Detection
Retrieval of similar heart sounds from a sound database has applications in physician training, diagnostic screening, and decision support. In this paper, we exploit a visual rende...
Tanveer Fathima Syeda-Mahmood, Fei Wang
MM
2004
ACM
183views Multimedia» more  MM 2004»
14 years 2 months ago
Content-based music structure analysis with applications to music semantics understanding
In this paper, we present a novel approach for music structure analysis. A new segmentation method, beat space segmentation, is proposed and used for music chord detection and voc...
Namunu Chinthaka Maddage, Changsheng Xu, Mohan S. ...
PEPM
2009
ACM
14 years 1 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson