To date, most clone detection techniques have concentrated on various forms of source code analysis, often by analyzing token streams. In this paper, we introduce a complementary ...
The value of business process models is dependent not only on the choice of graphical elements in the model, but also on their annotation with additional textual and graphical inf...
Spoken utterance retrieval was largely studied in the last decades, with the purpose of indexing large audio databases or of detecting keywords in continuous speech streams. While...
Mickael Rouvier, Georges Linares, Benjamin Lecoute...
In this paper we consider an interference channel where a set of primary active users are cooperating through interference alignment over a constant multiple-input-multiple-output...
Behrang Nosrat-Makouei, Jeffrey G. Andrews, Robert...
This paper presents an adaptable system for detecting trends based on the micro-blogging service Twitter, and sets out to explore to what extent such a tool can support researchers...
Peter Kraker, Claudia Wagner, Fleur Jeanquartier, ...