Sciweavers

2304 search results - page 320 / 461
» On the Vulnerability of Large Graphs
Sort
View
METRICS
2002
IEEE
15 years 3 months ago
Gemini: Maintenance Support Environment Based on Code Clone Analysis
Maintaining software systems is getting more complex and difficult task, as the scale becomes larger. It is generally said that code clone is one of the factors that make softwar...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
WISE
2002
Springer
15 years 3 months ago
Cluster-Based Delta Compression of a Collection of Files
Delta compression techniques are commonly used to succinctly represent an updated version of a file with respect to an earlier one. In this paper, we study the use of delta compr...
Zan Ouyang, Nasir D. Memon, Torsten Suel, Dimitre ...
MICCAI
2009
Springer
15 years 2 months ago
Bayesian Maximal Paths for Coronary Artery Segmentation from 3D CT Angiograms
We propose a recursive Bayesian model for the delineation of coronary arteries from 3D CT angiograms (cardiac CTA) and discuss the use of discrete minimal path techniques as an e...
David Lesage, Elsa D. Angelini, Isabelle Bloch, Ga...
CVPR
2000
IEEE
15 years 2 months ago
Geodesic Distance Evolution of Surfaces: A New Method for Matching Surfaces
The general problem of surface matching is taken up in this study. The process described in this work hinges on a geodesic distance equation for a family of surfaces embedded in t...
Hussein M. Yahia, Etienne G. Huot, Isabelle Herlin...
VLDB
1999
ACM
134views Database» more  VLDB 1999»
15 years 2 months ago
Capturing and Querying Multiple Aspects of Semistructured Data
Motivated to a large extent by the substantial and growing prominence of the World-Wide Web and the potential benefits that may be obtained by applying database concepts and tech...
Curtis E. Dyreson, Michael H. Böhlen, Christi...