Sciweavers

114 search results - page 23 / 23
» Reducing Configurations to Monitor in a Software Product Lin...
Sort
View
ASPLOS
2006
ACM
13 years 11 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
JCP
2007
154views more  JCP 2007»
13 years 5 months ago
Partially Reconfigurable Vector Processor for Embedded Applications
—Embedded systems normally involve a combination of hardware and software resources designed to perform dedicated tasks. Such systems have widely crept into industrial control, a...
Muhammad Z. Hasan, Sotirios G. Ziavras
EGH
2003
Springer
13 years 10 months ago
Automatic shader level of detail
Current graphics hardware can render procedurally shaded objects in real-time. However, due to resource and performance limitations, interactive shaders can not yet approach the c...
Marc Olano, Bob Kuehne, Maryann Simmons
UIC
2009
Springer
13 years 9 months ago
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
The major surveillance camera manufacturers have begun incorporating wireless networking functionality into their products to enable wireless access. However, the video feeds from ...
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portman...