Sciweavers

1379 search results - page 50 / 276
» codes 2009
Sort
View
CIKM
2009
Springer
15 years 10 months ago
Tree-pattern-based duplicate code detection
This paper presents a tree-pattern-based method of automatically and accurately finding code clones in program files. Duplicate tree-patterns are first collected by anti-unificati...
Hyo-Sub Lee, Kyung-Goo Doh
IH
2009
Springer
15 years 10 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
ICIP
2009
IEEE
16 years 5 months ago
Palmprint Verification Using Consistent Orientation Coding
Developing accurate and robust palmprint verification algorithms is one of the key issues in automatic palmprint recognition systems. Recently, orientation based coding algorithms...
ICC
2009
IEEE
239views Communications» more  ICC 2009»
15 years 10 months ago
An Analytical Approach for Throughput Evaluation of Wireless Network Coding
In this paper, we propose a new analytical model for throughput evaluation of wireless network coding. This new approach is based on a probabilistic viewpoint on network coding, i....
Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Ba...
POPL
2009
ACM
16 years 4 months ago
Unifying type checking and property checking for low-level code
We present a unified approach to type checking and property checking for low-level code. Type checking for low-level code is challenging because type safety often depends on compl...
Jeremy Condit, Brian Hackett, Shuvendu K. Lahiri, ...