Sciweavers

2074 search results - page 214 / 415
» Using an Object Reference Approach to Distributed Updates
Sort
View
INFOCOM
2007
IEEE
15 years 9 months ago
RFID-Based 3-D Positioning Schemes
Abstract— This research focuses on RFID-based 3-D positioning schemes, aiming to locate an object in a 3-dimensional space, with reference to a predetermined arbitrary coordinate...
Chong Wang, Hongyi Wu, Nian-Feng Tzeng
AOSD
2008
ACM
15 years 5 months ago
AJANA: a general framework for source-code-level interprocedural dataflow analysis of AspectJ software
Aspect-oriented software presents new challenges for the designers of static analyses. Our work aims to establish systematic foundations for dataflow analysis of AspectJ software....
Guoqing Xu, Atanas Rountev
189
Voted
ECOOP
2003
Springer
15 years 8 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky
154
Voted
ICMCS
2007
IEEE
155views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Hidden Maximum Entropy Approach for Visual Concept Modeling
Recently, the bag-of-words approach has been successfully applied to automatic image annotation, object recognition, etc. The method needs to first quantize an image using the vis...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
ICSE
2008
IEEE-ACM
16 years 3 months ago
PLURAL: checking protocol compliance under aliasing
Enforcing compliance to API usage protocols is notoriously hard due to possible aliasing of objects through multiple references. In previous work we proposed a sound, modular appr...
Kevin Bierhoff, Jonathan Aldrich