Sciweavers

799 search results - page 12 / 160
» Visualization of clone detection results
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
OOPSLA
2010
Springer
13 years 7 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
AVI
2006
13 years 10 months ago
Task-at-hand interface for change detection in stock market data
Companies trading stocks need to store information on stock prices over specific time intervals, which results in very large databases. Large quantities of numerical data (thousan...
Carmen Sanz Merino, Mike Sips, Daniel A. Keim, Chr...
CONTEXT
2005
Springer
14 years 2 months ago
Effect of the Task, Visual and Semantic Context on Word Target Detection
Although being a daily task, the search for a word among others words is a new research domain we investigated in order to find the kinds contextual factors that can facilitate sem...
Laure Léger, Charles Tijus, Thierry Baccino
CVPR
2010
IEEE
14 years 5 months ago
Visual Recognition and Detection Under Bounded Computational Resources
Visual recognition and detection are computationally intensive tasks and current research efforts primarily focus on solving them without considering the computational capability ...
Sudheendra Vijayanarasimhan, Ashish Kapoor