Sciweavers

1019 search results - page 34 / 204
» Referent Tracking and its Applications
Sort
View
ECOOP
2003
Springer
15 years 7 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 8 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
GLOBECOM
2009
IEEE
15 years 8 months ago
Interference Subspace Tracking for Network Interference Alignment in Cellular Systems
— In this paper, a practical solution to implement the distributed interference alignment (IA) algorithm of [1] in a cellular communication system is proposed. In the training pe...
Bo Niu, Alexander M. Haimovich
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
15 years 8 months ago
Mining Personally Important Places from GPS Tracks
The discovery of a person’s personally important places involves obtaining the physical locations for a person’s places that matter to his daily life and routines. This proble...
Changqing Zhou, Nupur Bhatnagar, Shashi Shekhar, L...
CVPR
2006
IEEE
15 years 8 months ago
Tracking of Multiple, Partially Occluded Humans based on Static Body Part Detection
Tracking of humans in videos is important for many applications. A major source of difficulty in performing this task is due to inter-human or scene occlusion. We present an appr...
Bo Wu, Ram Nevatia