Sciweavers

1183 search results - page 210 / 237
» Model Transformation for Service-Oriented Web Applications D...
Sort
View
PLDI
2003
ACM
15 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
EDBT
2009
ACM
135views Database» more  EDBT 2009»
15 years 2 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
EMSOFT
2001
Springer
15 years 2 months ago
Using Multiple Levels of Abstractions in Embedded Software Design
ltiple Levels of Abstractions in Embedded Software Design Jerry R. Burch1, Roberto Passerone1, and Alberto L. Sangiovanni-Vincentelli2 1 Cadence Berkeley Laboratories, Berkeley CA ...
Jerry R. Burch, Roberto Passerone, Alberto L. Sang...
80
Voted
INTERSPEECH
2010
14 years 4 months ago
On speaker adaptive training of artificial neural networks
In the paper we present two techniques improving the recognition accuracy of multilayer perceptron neural networks (MLP ANN) by means of adopting Speaker Adaptive Training. The us...
Jan Trmal, Jan Zelinka, Ludek Müller
76
Voted
EEE
2004
IEEE
15 years 1 months ago
Value-Based Design of Collaboration Processes for e-Commerce
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...
Pascal van Eck, Jaap Gordijn, Roel Wieringa