Sciweavers

48 search results - page 5 / 10
» Unique Renaming of Java Using Source Transformation
Sort
View
CL
2006
Springer
13 years 5 months ago
Runtime bytecode transformation for Smalltalk
Transforming programs to alter their semantics is of wide interest, for purposes as diverse as off-the-shelf component adaptation, optimization,tracegeneration,andexperimentationw...
Marcus Denker, Stéphane Ducasse, Éri...
WISA
2005
Springer
13 years 11 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...
CSDA
2007
169views more  CSDA 2007»
13 years 5 months ago
A null space method for over-complete blind source separation
In blind source separation, there are M sources that produce sounds independently and continuously over time. These sounds are then recorded by m receivers. The sound recorded by ...
Ray-Bing Chen, Ying Nian Wu
ICDE
2003
IEEE
101views Database» more  ICDE 2003»
14 years 6 months ago
XomatiQ: Living With Genomes, Proteomes, Relations and a Little Bit of XML
In this paper, we describe a system called XomatiQ to address the problem of integration, querying and correlation of biological data. XomatiQ is an integral part of the genomics ...
Sourav S. Bhowmick, Pedro Cruz, Amey V. Laud
MSR
2006
ACM
13 years 11 months ago
Using software birthmarks to identify similar classes and major functionalities
Software birthmarks are unique and native characteristics of every software component. Two components having similar birthmarks indicate that they are similar in functionality, st...
Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Ha...