Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
In this paper, a Successive Interference Cancellation (SIC) receiver typically used for Code Division Multiple Access (CDMA) communications is developed to be used as piano chord ...
Ana M. Barbancho, Isabel Barbancho, Beatriz Soto, ...
In this paper we introduce a family of filter kernels the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code Kern...
In archiving video for surveillance, frame-based coding has been used and it makes storage size large because the whole image is stored even if there is no object in the image. On...
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...