Sciweavers

1038 search results - page 200 / 208
» Boundary Points and Resolution
Sort
View
PLDI
2003
ACM
15 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
84
Voted
IMR
2003
Springer
15 years 2 months ago
A Mesh Warping Algorithm Based on Weighted Laplacian Smoothing
We present a new mesh warping algorithm for tetrahedral meshes based upon weighted laplacian smoothing. We start with a 3D domain which is bounded by a triangulated surface mesh a...
Suzanne M. Shontz, Stephen A. Vavasis
73
Voted
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 2 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
MMMACNS
2001
Springer
15 years 1 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
68
Voted
CBMS
2000
IEEE
15 years 1 months ago
Use of Shape Models to Search Digitized Spine X-rays
We are building a biomedical information resource consisting of digitized x-ray images and associated textual data from national health surveys. This resource, the Web-based Medic...
L. Rodney Long, George R. Thoma