We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
It is well known that how to extract dynamical features is a key issue for video based face analysis. In this paper, we present a novel approach of facial action units (AU) and ex...
This paper proposes a new publishing system using PC and large-sized printer that can produce high quality printed matters comprising text, charts, and illustrations, etc. To cons...
Fumio Kawazoe, Kazuo Toraichi, Paul Wing Hing Kwan...
The multicasting of an independent and identically distributed Gaussian source over a binary erasure broadcast channel is considered. This model applies to a one-to-many transmiss...
Ozgun Y. Bursalioglu, Maria Fresia, Giuseppe Caire...
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...