Sciweavers

2555 search results - page 427 / 511
» Putting complex systems to work
Sort
View
SIGSOFT
2003
ACM
16 years 1 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
105
Voted
EDBT
2008
ACM
161views Database» more  EDBT 2008»
16 years 26 days ago
Load distribution of analytical query workloads for database cluster architectures
Enterprises may have multiple database systems spread across the organization for redundancy or for serving different applications. In such systems, query workloads can be distrib...
Thomas Phan, Wen-Syan Li
ICRA
2007
IEEE
211views Robotics» more  ICRA 2007»
15 years 7 months ago
Control Camera and Light Source Positions using Image Gradient Information
— In this paper, we propose an original approach to control camera position and/or lighting conditions in an environment using image gradient information. Our goal is to ensure a...
Éric Marchand
90
Voted
IPPS
2007
IEEE
15 years 7 months ago
A Near-optimal Solution for the Heterogeneous Multi-processor Single-level Voltage Setup Problem
A heterogeneous multi-processor (HeMP) system consists of several heterogeneous processors, each of which is specially designed to deliver the best energy-saving performance for a...
Tai-Yi Huang, Yu-Che Tsai, Edward T.-H. Chu
117
Voted
TPHOL
2005
IEEE
15 years 6 months ago
A HOL Theory of Euclidean Space
We describe a formalization of the elementary algebra, topology and analysis of finite-dimensional Euclidean space in the HOL Light theorem prover. (Euclidean space is RN with the...
John Harrison