Sciweavers

877 search results - page 146 / 176
» Model Based Development of Safety-Critical Systems Using Tem...
Sort
View
POPL
2010
ACM
14 years 5 months ago
On the Verification Problem for Weak Memory Models
We address the verification problem of finite-state concurrent programs running under weak memory models. These models capture the reordering of program (read and write) operation...
Ahmed Bouajjani, Madanlal Musuvathi, Mohamed Faouz...
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
13 years 7 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
PLDI
2003
ACM
14 years 29 days ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
3DPVT
2004
IEEE
155views Visualization» more  3DPVT 2004»
13 years 11 months ago
Markerless Human Motion Transfer
In this paper we develop a computer vision-based system to transfer human motion from one subject to another. Our system uses a network of eight calibrated and synchronized camera...
German K. M. Cheung, Simon Baker, Jessica K. Hodgi...
ISD
1999
Springer
149views Database» more  ISD 1999»
13 years 12 months ago
Cost-Effective Determination of Biomass from Aerial Images
This paper describes an ongoing collaborative research program between the Computer Science and the Forestry and Wildlife Management Departments at the University of Massachusetts...
Howard J. Schultz, Dana Slaymaker, Chris Holmes, F...