Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Abstract-- Increasing delay and power variation are significant challenges to the designers as technology scales to the deep sub-micron (DSM) regime. Traditional module selection t...
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
In plenty of scenarios, data can be represented as vectors mathematically abstracted as points in a Euclidean space. Because a great number of machine learning and data mining app...
Social network systems on the Internet, such MySpace and LinkedIn, are growing in popularity around the world. The level of such activity is now comparable to that associated with...