Sciweavers

476 search results - page 70 / 96
» Algorithm, Implementation and Application of the SIM-DL Simi...
Sort
View
178
Voted
PLDI
2003
ACM
15 years 9 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
180
Voted
DAMON
2008
Springer
15 years 5 months ago
CAM conscious integrated answering of frequent elements and top-k queries over data streams
Frequent elements and top-k queries constitute an important class of queries for data stream analysis applications. Certain applications require answers for both frequent elements...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
138
Voted
IMC
2010
ACM
15 years 1 months ago
Revisiting the case for a minimalist approach for network flow monitoring
Network management applications require accurate estimates of a wide range of flow-level traffic metrics. Given the inadequacy of current packet-sampling-based solutions, several ...
Vyas Sekar, Michael K. Reiter, Hui Zhang
111
Voted
HPDC
2002
IEEE
15 years 8 months ago
A Scalable QoS-Aware Service Aggregation Model for Peer-to-Peer Computing Grids
Peer-to-peer (P2P) computing grids consist of peer nodes that communicate directly among themselves through wide-area networks and can act as both clients and servers. These syste...
Xiaohui Gu, Klara Nahrstedt
130
Voted
CVPR
2003
IEEE
16 years 5 months ago
Bayesian Tangent Shape Model: Estimating Shape and Pose Parameters via Bayesian Inference
12 In this paper we study the problem of shape analysis and its application in locating facial feature points on frontal faces. We propose a Bayesian inference solution based on ta...
Yi Zhou, Lie Gu, HongJiang Zhang