Sciweavers

431 search results - page 37 / 87
» The five orders of ignorance
Sort
View
SIGSOFT
2005
ACM
16 years 16 days ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
CC
2009
Springer
190views System Software» more  CC 2009»
16 years 14 days ago
SSA Elimination after Register Allocation
form uses a notational abstractions called -functions. These instructions have no analogous in actual machine instruction sets, and they must be replaced by ordinary instructions ...
Fernando Magno Quintão Pereira, Jens Palsbe...
CICLING
2009
Springer
16 years 12 days ago
Improved Unsupervised Name Discrimination with Very Wide Bigrams and Automatic Cluster Stopping
We cast name discrimination as a problem in clustering short contexts. Each occurrence of an ambiguous name is treated independently, and represented using second?order context vec...
Ted Pedersen
CHI
2001
ACM
16 years 5 days ago
What makes Web sites credible?: a report on a large quantitative study
The credibility of web sites is becoming an increasingly important area to understand. To expand knowledge in this domain, we conducted an online study that investigated how diffe...
B. J. Fogg, Jonathan Marshall, Othman Laraki, Alex...
PERCOM
2007
ACM
15 years 11 months ago
Middleware Support for Quality of Context in Pervasive Context-Aware Systems
Middleware support for pervasive context-aware systems relieves context-aware applications from dealing with the complexity of context-specific operations such as context acquisit...
Kamran Sheikh, Maarten Wegdam, Marten van Sinderen