Sciweavers

114 search results - page 19 / 23
» Exploiting Runtime Information in the IDE
Sort
View
ENTCS
2006
104views more  ENTCS 2006»
13 years 7 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas
VC
2008
143views more  VC 2008»
13 years 7 months ago
A single-pass GPU ray casting framework for interactive out-of-core rendering of massive volumetric datasets
We present an adaptive out-of-core technique for rendering massive scalar volumes employing single pass GPU raycasting. The method is based on the decomposition of a volumetric dat...
Enrico Gobbetti, Fabio Marton, José Antonio...
ISSTA
2012
ACM
11 years 9 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
ICDE
2000
IEEE
158views Database» more  ICDE 2000»
14 years 8 months ago
The DC-Tree: A Fully Dynamic Index Structure for Data Warehouses
: Many companies have recognized the strategic importance of the knowledge hidden in their large databases and have built data warehouses. Typically, updates are collected and appl...
Hans-Peter Kriegel, Jörn Kohlhammer, Martin E...
ISSTA
2010
ACM
13 years 11 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su