Sciweavers

220 search results - page 28 / 44
» A Language Independent Approach for Detecting Duplicated Cod...
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
Toward a detector-based universal phone recognizer
In recent research, we have proposed a high-accuracy bottom-up detection-based paradigm for continuous phone speech recognition. The key component of our system was a bank of arti...
Sabato Marco Siniscalchi, Torbjørn Svendsen...
96
Voted
SIGSOFT
2004
ACM
15 years 5 months ago
Resolving uncertainties during trace analysis
Software models provide independent perspectives onto software systems. Ideally, all models should use the same model element to describe the same part of a system. Practically, m...
Alexander Egyed
109
Voted
TON
2012
13 years 2 months ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
99
Voted
JUCS
2002
163views more  JUCS 2002»
15 years 2 days ago
Finding Plagiarisms among a Set of Programs with JPlag
: JPlag is a web service that finds pairs of similar programs among a given set of programs. It has successfully been used in practice for detecting plagiarisms among student Java ...
Lutz Prechelt, Guido Malpohl, Michael Philippsen
117
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....