Sciweavers

7623 search results - page 1268 / 1525
» Constructive Volume Modeling
Sort
View
ICSM
2008
IEEE
15 years 10 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ISM
2008
IEEE
134views Multimedia» more  ISM 2008»
15 years 10 months ago
GeM-Tree: Towards a Generalized Multidimensional Index Structure Supporting Image and Video Retrieval
In this paper, we propose a tree-based multidimensional structure, GeM-Tree, which indexes both images and videos within a single general framework utilizing Earth Mover’s Dista...
Kasturi Chatterjee, Shu-Ching Chen
ISMAR
2008
IEEE
15 years 10 months ago
Virtual redlining for civil engineering in real environments
Field workers of utility companies are regularly engaged in outdoor tasks such as network planning, maintenance and inspection of underground infrastructure. Redlining is the term...
Gerhard Schall, Erick Méndez, Dieter Schmal...
KBSE
2008
IEEE
15 years 10 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
« Prev « First page 1268 / 1525 Last » Next »