A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
We propose an operational method to extract the left ventricle (LV) systole dynamics using HARmonic Phase (HARP) images extracted from tagged cardiac MR sequences. Established tec...
Luc Florack, Hans C. van Assen, Avan Suinesiaputra
Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
The last decade has witnessed a rapid proliferation of superscalar cache-based microprocessors to build high-end computing (HEC) platforms, primarily because of their generality, ...
Leonid Oliker, Jonathan Carter, Michael F. Wehner,...