Sciweavers

766 search results - page 2 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
ACSC
2001
IEEE
13 years 9 months ago
Efficiency of Data Structures for Detecting Overlaps in Digital Documents
This paper analyses the efficiency of different data structures for detecting overlap in digital documents. Most existing approaches use some hash function to reduce the space req...
Krisztián Monostori, Arkady B. Zaslavsky, H...
IWPSE
2010
IEEE
13 years 3 months ago
An automated hint generation approach for supporting the evolution of requirements specifications
Updating the requirements specification during software evolution is a manual and expensive task. Therefore, software engineers usually choose to apply modifications directly to t...
Eya Ben Charrada, Martin Glinz
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 11 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
WCRE
2002
IEEE
13 years 10 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
ICSE
2007
IEEE-ACM
14 years 5 months ago
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
Detecting code clones has many software engineering applications. Existing approaches either do not scale to large code bases or are not robust against minor code modifications. I...
Ghassan Misherghi, Lingxiao Jiang, Stéphane...