Sciweavers

2956 search results - page 495 / 592
» Databases and Higher Types
Sort
View
CIKM
2009
Springer
15 years 4 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
ER
2009
Springer
92views Database» more  ER 2009»
15 years 4 months ago
From User Goals to Service Discovery and Composition
Goals are often used to represent stakeholder’s objectives. The intentionality inherited by a goal drives stakeholders to pursuit the fulfillment of their goals either by themse...
Luiz Olavo Bonino da Silva Santos, Giancarlo Guizz...
ICB
2009
Springer
202views Biometrics» more  ICB 2009»
15 years 4 months ago
Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features
Abstract. Fingerprints are considered to be unique because they contain various distinctive features, including minutiae, ridges, pores, etc. Some attempts have been made to model ...
Yi Chen, Anil K. Jain
DOCENG
2009
ACM
15 years 4 months ago
On the analysis of queries with counting constraints
We study the analysis problem of XPath expressions with counting constraints. Such expressions are commonly used in document transformations or programs in which they select porti...
Everardo Bárcenas, Pierre Genevès, N...
AICCSA
2008
IEEE
292views Hardware» more  AICCSA 2008»
15 years 4 months ago
Enumeration of maximal clique for mining spatial co-location patterns
This paper presents a systematic approach to mine colocation patterns in Sloan Digital Sky Survey (SDSS) data. SDSS Data Release 5 (DR5) contains 3.6 TB of data. Availability of s...
Ghazi Al-Naymat