Sciweavers

4359 search results - page 744 / 872
» Automated Pipeline Design
Sort
View
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
15 years 3 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu
WACV
2005
IEEE
15 years 3 months ago
Learning the Behavior of Users in a Public Space through Video Tracking
The paper describes a video tracking system that tracks and analyzes the behavioral pattern of users in a public space. We have obtained important statistical measurements about u...
Wei Yan, David A. Forsyth
ANCS
2005
ACM
15 years 3 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
MIR
2005
ACM
133views Multimedia» more  MIR 2005»
15 years 3 months ago
Probabilistic web image gathering
We propose a new method for automated large scale gathering of Web images relevant to specified concepts. Our main goal is to build a knowledge base associated with as many conce...
Keiji Yanai, Kobus Barnard
SIGECOM
2005
ACM
113views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Dynamic and secure B2B e-contract update management
Business-to-business electronic contracts provide a specification of the agreed value exchange and guarantee legal protection to companies during electronic trading relations. Imp...
Samuil Angelov, Sven Till, Paul W. P. J. Grefen