Sciweavers

146 search results - page 12 / 30
» Putting Pointer Analysis to Work
Sort
View
AIED
2005
Springer
14 years 1 months ago
Developing Teaching Aids for Distance Education
As web-enhanced courses become more successful, they put considerable burdens on instructors and teaching assistants. We present our work on developing software tools to support in...
Jihie Kim, Carole Beal, Zeeshan Maqbool
AIS
2004
Springer
13 years 7 months ago
Intelligent agents as innovations
This paper explores the treatment of intelligent agents as innovations. Past writings in the area of intelligent agents focus on the technical merits and internal workings of agent...
Alexander Serenko, Brian Detlor
SIES
2007
IEEE
14 years 1 months ago
Real-time characteristics of Switched Ethernet for "1553B"-Embedded Applications: Simulation and Analysis
In our previous work [1], Full Duplex Switched Ethernet was put forward as an attractive candidate to replace the MIL-STD 1553B data bus, in next generation "1553B"embedd...
Ahlem Mifdaoui, Fabrice Frances, Christian Fraboul
SIGSOFT
2003
ACM
14 years 8 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
PLDI
2006
ACM
14 years 1 months ago
Free-Me: a static analysis for automatic individual object reclamation
Garbage collection has proven benefits, including fewer memoryrelated errors and reduced programmer effort. Garbage collection, however, trades space for time. It reclaims memory...
Samuel Z. Guyer, Kathryn S. McKinley, Daniel Framp...