Sciweavers

8177 search results - page 295 / 1636
» Detecting System Emulators
Sort
View
175
Voted
WCRE
2008
IEEE
15 years 9 months ago
An Empirical Study of Function Clones in Open Source Software
The new hybrid clone detection tool NICAD combines the strengths and overcomes the limitations of both textbased and AST-based clone detection techniques to yield highly accurate ...
Chanchal Kumar Roy, James R. Cordy
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICDIM
2008
IEEE
15 years 9 months ago
Dynamic detection and administration of materialized views based on the Query Graph Model
Database Management Systems (DBMS) are complex software systems which are used in an increasing number of applications. To obtain the best performance for business relevant applic...
Andreas Lübcke, Ingolf Geist, Ronny Bubke
HAPTICS
2006
IEEE
15 years 9 months ago
Fingertip Vibratory Transducer for Detecting Optical Edges Using Regenerative Feedback
We present a new method for sensing the visual environment using multiple transducers, each mounted on an individual fingertip to sense a single point in the visual surroundings. ...
Kimberly Zawrotny, Apryl Craig, David Weiser, Robe...
IJCAI
1997
15 years 4 months ago
Name-It: Naming and Detecting Faces in Video by the Integration of Image and Natural Language Processing
We have been developing Name-It, a system that associates faces and names in news videos. First, as the only knowledge source, the system is given news videos which include image ...
Shin'ichi Satoh, Yuichi Nakamura, Takeo Kanade