Sciweavers

8614 search results - page 1483 / 1723
» Mining
Sort
View
JCDL
2009
ACM
102views Education» more  JCDL 2009»
15 years 10 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson
124
Voted
MM
2009
ACM
230views Multimedia» more  MM 2009»
15 years 10 months ago
Query expansion for hash-based image object retrieval
An efficient indexing method is essential for content-based image retrieval with the exponential growth in large-scale videos and photos. Recently, hash-based methods (e.g., local...
Yin-Hsi Kuo, Kuan-Ting Chen, Chien-Hsing Chiang, W...
MSR
2009
ACM
15 years 10 months ago
Code siblings: Technical and legal implications of copying code between applications
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...
Daniel M. Germán, Massimiliano Di Penta, Ya...
119
Voted
MSR
2009
ACM
15 years 10 months ago
A platform for software engineering research
Research in the fields of software quality, maintainability and evolution requires the analysis of large quantities of data, which often originate from open source software proje...
Georgios Gousios, Diomidis Spinellis
149
Voted
PETRA
2009
ACM
15 years 10 months ago
Towards automated large vocabulary gesture search
This paper describes work towards designing a computer vision system for helping users look up the meaning of a sign. Sign lookup is treated as a video database retrieval problem....
Alexandra Stefan, Haijing Wang, Vassilis Athitsos
« Prev « First page 1483 / 1723 Last » Next »