Sciweavers

110 search results - page 22 / 22
» The CLEF 2003 Interactive Track
Sort
View
SIGSOFT
2003
ACM
14 years 6 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
PERCOM
2003
ACM
14 years 5 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
SI3D
2003
ACM
13 years 11 months ago
Interruptible rendering
Interruptible rendering is a novel approach to the fidelity-versusperformance tradeoff ubiquitous in real-time rendering. Interruptible rendering unifies spatial error, caused by ...
Cliff Woolley, David P. Luebke, Benjamin Watson, A...
ICRA
2002
IEEE
101views Robotics» more  ICRA 2002»
13 years 10 months ago
Rover Autonomy for Long Range Navigation and Science Data Acquisition on Planetary Surfaces
This paper describes recent work undertaken at the Jet Propulsion Laboratory in Pasadena, CA in the area of increased rover autonomy for planetary surface operations. The primary ...
Terrance L. Huntsberger, Hrand Aghazarian, Yang Ch...
LISA
2003
13 years 7 months ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal