Sciweavers

1687 search results - page 101 / 338
» Which pointer analysis should I use
Sort
View
SMA
2003
ACM
118views Solid Modeling» more  SMA 2003»
15 years 9 months ago
Graph based topological analysis of tessellated surfaces
In this paper a graph-based method is presented which not only characterizes topological classification of the tessellated surfaces but also simultaneously generates the substanti...
Tula Ram Ban, Dibakar Sen
122
Voted
PRL
2006
93views more  PRL 2006»
15 years 3 months ago
ROC curves and video analysis optimization in intestinal capsule endoscopy
Wireless capsule endoscopy involves inspection of hours of video material by a highly qualified professional. Time episodes corresponding to intestinal contractions, which are of ...
Fernando Vilariño, Ludmila I. Kuncheva, Pet...
160
Voted
MM
2004
ACM
195views Multimedia» more  MM 2004»
15 years 9 months ago
Hierarchical clustering of WWW image search results using visual, textual and link information
We consider the problem of clustering Web image search results. Generally, the image search results returned by an image search engine contain multiple topics. Organizing the resu...
Deng Cai, Xiaofei He, Zhiwei Li, Wei-Ying Ma, Ji-R...
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 9 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
APSEC
2005
IEEE
15 years 9 months ago
Automated Refactoring of Objects for Application Partitioning
Distributed infrastructures are becoming more and more diverse in nature. An application may often need to be redeployed in various scenarios. Ideally, given an application design...
Vikram Jamwal, Sridhar Iyer