Sciweavers

886 search results - page 109 / 178
» Generalized Bezout Identity
Sort
View
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
14 years 2 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
METRICS
2005
IEEE
14 years 2 months ago
On Refactoring Support Based on Code Clone Dependency Relation
Generally, code clones are regarded as one of the factors that make software maintenance more difficult. A code clone is a set of source code fragments identical or similar to ea...
Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, ...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
14 years 2 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
JCDL
2005
ACM
116views Education» more  JCDL 2005»
14 years 2 months ago
Name disambiguation in author citations using a K-way spectral clustering method
An author may have multiple names and multiple authors may share the same name simply due to name abbreviations, identical names, or name misspellings in publications or bibliogra...
Hui Han, Hongyuan Zha, C. Lee Giles
MM
2005
ACM
157views Multimedia» more  MM 2005»
14 years 2 months ago
Natural language processing of lyrics
We report experiments on the use of standard natural language processing (NLP) tools for the analysis of music lyrics. A significant amount of music audio has lyrics. Lyrics enco...
Jose P. G. Mahedero, Alvaro Martinez, Pedro Cano, ...