Sciweavers

6941 search results - page 1237 / 1389
» Testing as a Certification Approach
Sort
View
ICSE
2008
IEEE-ACM
16 years 4 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
WWW
2009
ACM
16 years 4 months ago
A class-feature-centroid classifier for text categorization
Automated text categorization is an important technique for many web applications, such as document indexing, document filtering, and cataloging web resources. Many different appr...
Hu Guan, Jingyu Zhou, Minyi Guo
WWW
2005
ACM
16 years 4 months ago
Sampling search-engine results
We consider the problem of efficiently sampling Web search engine query results. In turn, using a small random sample instead of the full set of results leads to efficient approxi...
Aris Anagnostopoulos, Andrei Z. Broder, David Carm...
142
Voted
ESORICS
2009
Springer
16 years 4 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
CHI
2009
ACM
16 years 4 months ago
Dancing with myself: the interactive visual canon platform
The canon is a composition pattern with a long history and many forms. The concept of the canon has also been applied to experimental film making and on Japanese television. We de...
Christoph Bartneck, Martijn ten Bhömer, Mathi...
« Prev « First page 1237 / 1389 Last » Next »