Sciweavers

787 search results - page 93 / 158
» Source code analysis and manipulation
Sort
View
ICIP
2002
IEEE
14 years 11 months ago
A no-reference perceptual blur metric
In this paper, we present a no-reference blur metric for images and video. The blur metric is based on the analysis of the spread of the edges in an image. Its perceptual signific...
Frédéric Dufaux, Pina Marziliano, St...
VMCAI
2005
Springer
14 years 3 months ago
Termination of Polynomial Programs
We present a technique to prove termination of multipath polynomial programs, an expressive class of loops that enables practical traction and analysis. The technique is based on ď...
Aaron R. Bradley, Zohar Manna, Henny B. Sipma
ENTCS
2007
139views more  ENTCS 2007»
13 years 9 months ago
A Change-based Approach to Software Evolution
Software evolution research is limited by the amount of information available to researchers: Current version control tools do not store all the information generated by developer...
Romain Robbes, Michele Lanza
KBSE
2008
IEEE
14 years 4 months ago
Dependence Anti Patterns
A Dependence Anti Pattern is a dependence structure that may indicate potential problems for on–going software maintenance and evolution. Dependence anti patterns are not struct...
David Binkley, Nicolas Gold, Mark Harman, Zheng Li...
ICA
2007
Springer
14 years 4 months ago
Hierarchical ALS Algorithms for Nonnegative Matrix and 3D Tensor Factorization
In the paper we present new Alternating Least Squares (ALS) algorithms for Nonnegative Matrix Factorization (NMF) and their extensions to 3D Nonnegative Tensor Factorization (NTF) ...
Andrzej Cichocki, Rafal Zdunek, Shun-ichi Amari