We detect design patterns in legacy code combining static and dynamic analyses. The analyses do not depend on coding or naming conventions. We classify potential pattern instances...
Driving behavior has been trending towards more time in the car and longer commutes. This has fueled the demand for an increasing number of in-vehicle infotainment features, at th...
Jackie C. Chang, Annie Lien, Brian Lathrop, Holger...
Classification of documents by genre is typically done either using linguistic analysis or term frequency based techniques. The former provides better classification accuracy than...
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
In this paper we present and discuss the system we developed for the search task of the TRECVID 2002, and its evaluation in an interactive search task. To do this we will look at ...
Georgina Gaughan, Alan F. Smeaton, Cathal Gurrin, ...