Sciweavers

15885 search results - page 3071 / 3177
» Strategic Software Engineering
Sort
View
131
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
120
Voted
MM
2006
ACM
119views Multimedia» more  MM 2006»
15 years 9 months ago
Modelling dependency in multimedia streams
Expressing and analysing data dependency in multimedia streams is promising, since content-aware policies at a transport level would benefit from such services. In this paper we ...
Alexander Eichhorn
118
Voted
PLDI
2006
ACM
15 years 9 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
130
Voted
SAC
2006
ACM
15 years 9 months ago
Evaluation of rule-based modularization in model transformation languages illustrated with ATL
This paper studies ways for modularizing transformation definitions in current rule-based model transformation languages. Two scenarios are shown in which the modular units are id...
Ivan Kurtev, Klaas van den Berg, Fréd&eacut...
112
Voted
UIST
2006
ACM
15 years 9 months ago
Multi-user, multi-display interaction with a single-user, single-display geospatial application
In this paper, we discuss our adaptation of a single-display, single-user commercial application for use in a multi-device, multi-user environment. We wrap Google Earth, a popular...
Clifton Forlines, Alan Esenther, Chia Shen, Daniel...
« Prev « First page 3071 / 3177 Last » Next »