Sciweavers

152 search results - page 21 / 31
» Discovering Identity Problems: A Case Study
Sort
View
DIAGRAMS
2006
Springer
13 years 11 months ago
From Diagrams to Models by Analogical Transfer
Abstract. We present a method for constructing a teleological model of a drawing of a physical device through analogical transfer of the teleological model of the same device in an...
Patrick W. Yaner, Ashok K. Goel
ISAAC
2004
Springer
125views Algorithms» more  ISAAC 2004»
14 years 3 months ago
Local Gapped Subforest Alignment and Its Application in Finding RNA Structural Motifs
RNA molecules whose secondary structures contain similar substructures often have similar functions. Therefore, an important task in the study of RNA is to develop methods for disc...
Jesper Jansson, Ngo Trung Hieu, Wing-Kin Sung
ASIAMS
2008
IEEE
13 years 12 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
PADL
2010
Springer
14 years 6 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
ICSM
2007
IEEE
14 years 4 months ago
An Activity-Based Quality Model for Maintainability
Maintainability is a key quality attribute of successful software systems. However, its management in practice is still problematic. Currently, there is no comprehensive basis for...
Florian Deissenboeck, Stefan Wagner, Markus Pizka,...