Sciweavers

1336 search results - page 133 / 268
» codes 2005
Sort
View
96
Voted
SIGSOFT
2005
ACM
16 years 1 months ago
Context- and path-sensitive memory leak detection
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying e...
Yichen Xie, Alexander Aiken
ICIAP
2005
ACM
16 years 28 days ago
Half-Pixel Correction for MPEG-2/H.264 Transcoding
To improve video quality and coding efficiency, H.264/AVC [1] has adopted several newer coding tools such as a 4?4 integer DCT and a method for calculating half pixels than the pre...
Soon-young Kwon, Joo-Kyong Lee, Ki-Dong Chung
98
Voted
ICSE
2005
IEEE-ACM
16 years 27 days ago
Object naming analysis for reverse-engineered sequence diagrams
UML sequence diagrams are commonly used to represent object interactions in software systems. This work considers the problem of extracting UML sequence diagrams from existing cod...
Atanas Rountev, Beth Harkness Connell
96
Voted
DCC
2005
IEEE
16 years 12 days ago
The Near Resolvable 2-(13, 4, 3) Designs and Thirteen-Player Whist Tournaments
A v-player whist tournament is a schedule of games, where in each round the v players are partitioned into games of four players each with at most one player left over. In each ga...
Harri Haanpää, Petteri Kaski
73
Voted
WCRE
2007
IEEE
15 years 7 months ago
Clone Detection via Structural Abstraction
tection via Structural Abstraction William S. Evans Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z4, CANADA Christopher W. Fraser Microsoft Re...
William S. Evans, Christopher W. Fraser, Fei Ma