Sciweavers

262 search results - page 47 / 53
» Refactoring Support Based on Code Clone Analysis
Sort
View
PLDI
2003
ACM
14 years 1 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
ICFP
1997
ACM
14 years 1 days ago
Implementing Bit-addressing with Specialization
General media-processing programs are easily expressed with bitaddressing and variable-sized bit-fields. But the natural implementation of bit-addressing relies on dynamic shift ...
Scott Draves
RECOMB
2008
Springer
14 years 8 months ago
Integrating Sequence and Topology for Efficient and Accurate Detection of Horizontal Gene Transfer
Abstract. One phylogeny-based approach to horizontal gene transfer (HGT) detection entails comparing the topology of a gene tree to that of the species tree, and using their differ...
Cuong Than, Guohua Jin, Luay Nakhleh
EJASP
2010
166views more  EJASP 2010»
13 years 2 months ago
Decoding Schemes for FBMC with Single-Delay STTC
Orthogonally multiplexed Quadrature Amplitude Modulation (O-QAM) with Filter Banks based Multi Carrier modulation (FBMC) is a multi-carrier modulation scheme that can be considere...
Chrislin Lélé, Didier Le Ruyet
RV
2010
Springer
220views Hardware» more  RV 2010»
13 years 5 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu