Sciweavers

2715 search results - page 464 / 543
» An Implementation of Narrowing Strategies
Sort
View
CGO
2010
IEEE
13 years 7 months ago
On improving heap memory layout by dynamic pool allocation
Dynamic memory allocation is widely used in modern programs. General-purpose heap allocators often focus more on reducing their run-time overhead and memory space utilization, but...
Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew
EUROMED
2010
13 years 7 months ago
Communication of Digital Cultural Heritage in Public Spaces by the Example of Roman Cologne
Abstract. The communication of cultural heritage in public spaces such as museums or exhibitions, gain more and more importance during the last years. The possibilities of interact...
Matthias Trapp, Amir Semmo, Rafael Pokorski, Claus...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 7 months ago
Efficient state space exploration: Interleaving stateless and state-based model checking
State-based model checking methods comprise computing and storing reachable states, while stateless model checking methods directly reason about reachable paths using decision proc...
Malay K. Ganai, Chao Wang, Weihong Li
TACAS
2010
Springer
160views Algorithms» more  TACAS 2010»
13 years 6 months ago
Efficient Detection of Errors in Java Components Using Random Environment and Restarts
Software model checkers are being used mostly to discover specific types of errors in the code, since exhaustive verification of complex programs is not possible due to state explo...
Pavel Parizek, Tomás Kalibera