Sciweavers

10909 search results - page 1925 / 2182
» Evaluating Backup Algorithms
Sort
View
DAC
2004
ACM
16 years 6 months ago
A frequency relaxation approach for analog/RF system-level simulation
The increasing complexity of today's mixed-signal integrated circuits necessitates both top-down and bottom-up system-level verification. Time-domain state-space modeling and...
Xin Li, Yang Xu, Peng Li, Padmini Gopalakrishnan, ...
MICCAI
2002
Springer
16 years 5 months ago
Standardized Analysis of Intracranial Aneurysms Using Digital Video Sequences
CT-angiography is a well established medical imaging technique for the detection, evaluation and therapy planning of intracranial aneurysms. Different 3D visualization algorithms s...
Sabine Iserhardt-Bauer, Peter Hastreiter, Bernd To...
MICCAI
2004
Springer
16 years 5 months ago
Geometric Flows for Segmenting Vasculature in MRI: Theory and Validation
Abstract. Often in neurosurgical planning a dual spin echo acquisition is performed that yields proton density (PD) and T2-weighted images to evaluate edema near a tumor or lesion....
Maxime Descoteaux, D. Louis Collins, Kaleem Siddiq...
ICSE
2008
IEEE-ACM
16 years 5 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
SIGSOFT
2007
ACM
16 years 5 months ago
Context-based detection of clone-related bugs
Studies show that programs contain much similar code, commonly known as clones. One of the main reasons for introducing clones is programmers' tendency to copy and paste code...
Lingxiao Jiang, Zhendong Su, Edwin Chiu
« Prev « First page 1925 / 2182 Last » Next »