Sciweavers

29 search results - page 4 / 6
» ccr 2000
Sort
View
JCSS
2000
71views more  JCSS 2000»
14 years 9 months ago
Path Constraints in Semistructured Databases
We investigate a class of path constraints that is of interest in connection with both semistructured and structured data. In standard database systems, constraints are typically ...
Peter Buneman, Wenfei Fan, Scott Weinstein
CC
2000
Springer
100views System Software» more  CC 2000»
15 years 1 months ago
A Static Study of Java Exceptions Using JESP
JESP is a tool for statically examining the usage of user thrown exceptions in Java source code. Reported here are the first findings over a dataset of 31 publicly available Java...
Barbara G. Ryder, Donald Smith, Ulrich Kremer, Mic...
KONVENS
2000
15 years 29 days ago
A Noise Suppression System for the AMR Speech Codec
In this paper we describe a noise reduction preprocessing algorithm for the adaptive multirate (AMR) speech codec of the GSM system. The algorithm is based on spectral weighting a...
Peter Jax, Rainer Martin, Peter Vary, Marc Adrat, ...
JPDC
2000
95views more  JPDC 2000»
14 years 9 months ago
Permutation Capability of Optical Multistage Interconnection Networks
In this paper, we study optical multistage interconnection networks (MINs). Advances in electro-optic technologies have made optical communication a promising networking choice to...
Yuanyuan Yang, Jianchao Wang, Yi Pan
ASPLOS
2006
ACM
15 years 3 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley