Sciweavers

260 search results - page 24 / 52
» Industry-scale duplicate detection
Sort
View
PEPM
2009
ACM
15 years 2 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
77
Voted
SIGMOD
1997
ACM
113views Database» more  SIGMOD 1997»
15 years 1 months ago
Size Separation Spatial Join
The Partitioned Based Spatial-Merge Join (PBSM) of Patel and DeWitt and the Size Separation Spatial Join (S3 J) of Koudas and Sevcik are considered to be among the most efficient ...
Nick Koudas, Kenneth C. Sevcik
LCTRTS
2011
Springer
14 years 16 days ago
An approach to improving the structure of error-handling code in the linux kernel
nguage does not provide any abstractions for exception handling or other forms of error handling, leaving programmers to devise their own conventions for detecting and handling er...
Suman Saha, Julia L. Lawall, Gilles Muller
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
ADHOCNOW
2009
Springer
14 years 10 months ago
An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks
Several protocols of address autoconfiguration in the mobile ad hoc network (MANET) are present in the current literature. Although some of these protocols perform decently in spar...
Syed Rafiul Hussain, Subrata Saha, Ashikur Rahman