Sciweavers

11523 search results - page 2141 / 2305
» Multimedia Database Systems
Sort
View
HPCA
2005
IEEE
16 years 2 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
ICSE
2007
IEEE-ACM
16 years 2 months ago
Mining Software Engineering Data
Software engineering data (such as code bases, execution traces, historical code changes, mailing lists, and bug databases) contains a wealth of information about a project's...
Tao Xie, Jian Pei, Ahmed E. Hassan
SODA
2010
ACM
196views Algorithms» more  SODA 2010»
15 years 11 months ago
Deletion Without Rebalancing in Balanced Binary Trees
We address the vexing issue of deletions in balanced trees. Rebalancing after a deletion is generally more complicated than rebalancing after an insertion. Textbooks neglect delet...
Siddhartha Sen, Robert E. Tarjan
ICDE
2010
IEEE
401views Database» more  ICDE 2010»
15 years 11 months ago
Continuous Query Evaluation over Distributed Sensor Networks
— In this paper1 we address the problem of processing continuous multi-join queries, over distributed data streams. Our approach makes use of existing work in the field of publi...
Oana Jurca, Sebastian Michel, Alexandre Herrmann, ...
CVPR
2010
IEEE
15 years 11 months ago
Robust Classification of Objects, Faces, and Flowers Using Natural Image Statistics
Classification of images in many category datasets has rapidly improved in recent years. However, systems that perform well on particular datasets typically have one or more lim...
Christopher Kanan, Garrison Cottrell
« Prev « First page 2141 / 2305 Last » Next »