Sciweavers

1421 search results - page 99 / 285
» The First and Second Max-SAT Evaluations
Sort
View
ICSM
2009
IEEE
14 years 4 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
ACCV
2009
Springer
14 years 4 months ago
Similarity Scores Based on Background Samples
Evaluating the similarity of images and their descriptors by employing discriminative learners has proven itself to be an effective face recognition paradigm. In this paper we sho...
Lior Wolf, Tal Hassner, Yaniv Taigman
FMCAD
2009
Springer
14 years 4 months ago
Decision diagrams for linear arithmetic
—Boolean manipulation and existential quantification of numeric variables from linear arithmetic (LA) formulas is at the core of many program analysis and software model checkin...
Sagar Chaki, Arie Gurfinkel, Ofer Strichman
IEAAIE
2009
Springer
14 years 4 months ago
Using Genetic Process Mining Technology to Construct a Time-Interval Process Model
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
Chieh-Yuan Tsai, I-Ching Chen
SIGMETRICS
2009
ACM
149views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
On the treeness of internet latency and bandwidth
Existing empirical studies of Internet structure and path properties indicate that the Internet is tree-like. This work quantifies the degree to which at least two important Inte...
Venugopalan Ramasubramanian, Dahlia Malkhi, Fabian...