Sciweavers

27336 search results - page 5434 / 5468
» Changing the subject: on the subject of subjectivity
Sort
View
INFOCOM
2012
IEEE
13 years 10 days ago
On exploiting flow allocation with rate adaptation for green networking
Abstract—Network power consumption can be reduced considerably by adapting link data rates to their offered traffic loads. In this paper, we exploit how to leverage rate adaptat...
Jian Tang, Brendan Mumey, Yun Xing, Andy Johnson
INFOCOM
2012
IEEE
13 years 10 days ago
Spectrum management and power allocation in MIMO cognitive networks
Cognitive radio (CR) techniques improve the spectrum utilization by exploiting temporarily-free frequency bands (i.e., in the time domain). The spectrum utilization can be boosted...
Diep N. Nguyen, Marwan Krunz
ISSTA
2012
ACM
13 years 10 days ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
ISSTA
2012
ACM
13 years 10 days ago
Residual investigation: predictive and precise bug detection
We introduce the concept of “residual investigation” for program analysis. A residual investigation is a dynamic check installed as a result of running a static analysis that ...
Kaituo Li, Christoph Reichenbach, Christoph Csalln...
ISSTA
2012
ACM
13 years 10 days ago
Finding errors in multithreaded GUI applications
To keep a Graphical User Interface (GUI) responsive and active, a GUI application often has a main UI thread (or event dispatching thread) and spawns separate threads to handle le...
Sai Zhang, Hao Lü, Michael D. Ernst
« Prev « First page 5434 / 5468 Last » Next »