Sciweavers

3316 search results - page 652 / 664
» Mining Software Engineering Data
Sort
View
POPL
2007
ACM
14 years 10 months ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
SI3D
2005
ACM
14 years 3 months ago
Volume catcher
It is difficult to obtain a specific region within unsegmented volume data (region of interest, ROI). The user must first segment the volume, a task which itself involves signi...
Shigeru Owada, Frank Nielsen, Takeo Igarashi
UIST
2004
ACM
14 years 3 months ago
Citrine: providing intelligent copy-and-paste
We present Citrine, a system that extends the widespread copy-and-paste interaction technique with intelligent transformations, making it useful in more situations. Citrine uses t...
Jeffrey Stylos, Brad A. Myers, Andrew Faulring
TES
2001
Springer
14 years 2 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
14 years 1 months ago
Improving evolutionary real-time testing
Embedded systems are often used in a safety-critical context, e.g. in airborne or vehicle systems. Typically, timing constraints must be satisfied so that real-time embedded syste...
Marouane Tlili, Stefan Wappler, Harmen Sthamer