Sciweavers

260 search results - page 45 / 52
» Industry-scale duplicate detection
Sort
View
ESE
2008
112views Database» more  ESE 2008»
14 years 9 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
IJMMS
2008
108views more  IJMMS 2008»
14 years 9 months ago
Ontology-based information extraction and integration from heterogeneous data sources
In this paper we present the design, implementation and evaluation of SOBA, a system for ontology-based information extraction from heterogeneous data resources, including plain t...
Paul Buitelaar, Philipp Cimiano, Anette Frank, Mat...
JMM2
2008
107views more  JMM2 2008»
14 years 9 months ago
Finding Interesting Images in Albums using Attention
Commercial systems such as Flickr display interesting photos from their collection as an interaction mechanism for sampling the collection. It purely relies on social activity anal...
Karthikeyan Vaiapury, Mohan S. Kankanhalli
70
Voted
JCB
2007
106views more  JCB 2007»
14 years 9 months ago
Clustered Sequence Representation for Fast Homology Search
We present a novel approach to managing redundancy in sequence databanks such as GenBank. We store clusters of near-identical sequences as a representative union-sequence and a se...
Michael Cameron, Yaniv Bernstein, Hugh E. Williams
IJWIN
2002
111views more  IJWIN 2002»
14 years 9 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...