Sciweavers

9316 search results - page 175 / 1864
» Analysis of traceback techniques
Sort
View
SCAM
2003
IEEE
15 years 9 months ago
Online Cycle Detection and Difference Propagation for Pointer Analysis
This paper presents and evaluates a number of techniques to improve the execution time of interprocedural pointer analysis in the context of large C programs. The analysis is form...
David J. Pearce, Paul H. J. Kelly, Chris Hankin
CVPR
2000
IEEE
15 years 8 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...
148
Voted
WCET
2003
15 years 5 months ago
Fully Automatic, Parametric Worst-Case Execution Time Analysis
Worst-Case Execution Time (WCET) analysis means to compute a safe upper bound to the execution time of a piece of code. Parametric WCET analysis yields symbolic upper bounds: expr...
Björn Lisper
SIGSOFT
2003
ACM
16 years 4 months ago
Runtime safety analysis of multithreaded programs
Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dep...
Koushik Sen, Grigore Rosu, Gul Agha
ECML
2007
Springer
15 years 10 months ago
Using Text Mining and Link Analysis for Software Mining
Many data mining techniques are these days in use for ontology learning – text mining, Web mining, graph mining, link analysis, relational data mining, and so on. In the current ...
Miha Grcar, Marko Grobelnik, Dunja Mladenic