Sciweavers

1183 search results - page 210 / 237
» Model Transformation for Service-Oriented Web Applications D...
Sort
View
PLDI
2003
ACM
14 years 28 days ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 10 days ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
EMSOFT
2001
Springer
14 years 5 days ago
Using Multiple Levels of Abstractions in Embedded Software Design
ltiple Levels of Abstractions in Embedded Software Design Jerry R. Burch1, Roberto Passerone1, and Alberto L. Sangiovanni-Vincentelli2 1 Cadence Berkeley Laboratories, Berkeley CA ...
Jerry R. Burch, Roberto Passerone, Alberto L. Sang...
INTERSPEECH
2010
13 years 2 months ago
On speaker adaptive training of artificial neural networks
In the paper we present two techniques improving the recognition accuracy of multilayer perceptron neural networks (MLP ANN) by means of adopting Speaker Adaptive Training. The us...
Jan Trmal, Jan Zelinka, Ludek Müller
EEE
2004
IEEE
13 years 11 months ago
Value-Based Design of Collaboration Processes for e-Commerce
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...
Pascal van Eck, Jaap Gordijn, Roel Wieringa