Sciweavers

1629 search results - page 111 / 326
» Infeasible Code Detection
Sort
View
WCRE
1999
IEEE
15 years 2 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
ICASSP
2011
IEEE
14 years 1 months ago
SIC receiver for polyphonic piano music
In this paper, a Successive Interference Cancellation (SIC) receiver typically used for Code Division Multiple Access (CDMA) communications is developed to be used as piano chord ...
Ana M. Barbancho, Isabel Barbancho, Beatriz Soto, ...
ICPR
2004
IEEE
15 years 11 months ago
Filtering with Gray-Code Kernels
In this paper we introduce a family of filter kernels the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code Kern...
Gil Ben-Artzi, Hagit Hel-Or, Yacov Hel-Or
ICPR
2004
IEEE
15 years 11 months ago
Object-Based Video Coding Using Pixel State Analysis
In archiving video for surveillance, frame-based coding has been used and it makes storage size large because the whole image is stored even if there is no object in the image. On...
Hironobu Fujiyoshi, Takayuki Nishi
ICASSP
2008
IEEE
15 years 4 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod