Sciweavers

1760 search results - page 227 / 352
» A System to Mark Programs Automatically
Sort
View
ICSM
2009
IEEE
15 years 10 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
133
Voted
MM
2009
ACM
185views Multimedia» more  MM 2009»
15 years 10 months ago
Deep exploration for experiential image retrieval
Experiential image retrieval systems aim to provide the user with a natural and intuitive search experience. The goal is to empower the user to navigate large collections based on...
Bart Thomee, Mark J. Huiskes, Erwin M. Bakker, Mic...
MM
2004
ACM
174views Multimedia» more  MM 2004»
15 years 9 months ago
Speech, ink, and slides: the interaction of content channels
In this paper, we report on an empirical exploration of digital ink and speech usage in lecture presentation. We studied the video archives of five Master’s level Computer Scien...
Richard J. Anderson, Crystal Hoyer, Craig Prince, ...
118
Voted
EGH
2003
Springer
15 years 8 months ago
Simulation of cloud dynamics on graphics hardware
This paper presents a physically-based, visually-realistic interactive cloud simulation. Clouds in our system are modeled using partial differential equations describing fluid mot...
Mark J. Harris, William V. Baxter, Thorsten Scheue...
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 7 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz