Sciweavers

5588 search results - page 911 / 1118
» Parallel Implementation of Bags
Sort
View
121
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
120
Voted
ISBI
2006
IEEE
16 years 4 months ago
Evaluation of anisotropic filters for diffusion tensor imaging
Diffusion tensor imaging (DTI) measures, such as fractional anisotropy (FA), and trace are very sensitive to noise contained in the acquired diffusion weighted images. Typical iso...
Jee Eun Lee, Moo K. Chung, Andrew L. Alexander
120
Voted
WWW
2008
ACM
16 years 4 months ago
Asymmetrical query recommendation method based on bipartite network resource allocation
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we ...
Zhiyuan Liu, Maosong Sun
HPCA
2008
IEEE
16 years 3 months ago
Fabric convergence implications on systems architecture
Converged fabrics that support data, storage, and cluster networking in a unified fashion are desirable for their cost and manageability advantages. Recent trends towards higher-b...
Kevin Leigh, Parthasarathy Ranganathan, Jaspal Sub...
105
Voted
HPCA
2006
IEEE
16 years 3 months ago
ReViveI/O: efficient handling of I/O in highly-available rollback-recovery servers
The increasing demand for reliable computers has led to proposals for hardware-assisted rollback of memory state. Such approach promises major reductions in Mean Time To Repair (M...
Jun Nakano, Pablo Montesinos, Kourosh Gharachorloo...