Sciweavers

4923 search results - page 788 / 985
» Software Risk Management
Sort
View
HICSS
2003
IEEE
106views Biometrics» more  HICSS 2003»
14 years 2 months ago
Is web-based seminar an effective way of learning in adult education?
The Internet can be used to solve pedagogical problems. To give an example, seminars for crowded courses exceeding a hundred participants would not be possible without web-based a...
Pekka Makkonen
PLDI
2003
ACM
14 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
PLDI
2003
ACM
14 years 2 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
SIGMETRICS
2003
ACM
129views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Run-time modeling and estimation of operating system power consumption
The increasing constraints on power consumption in many computing systems point to the need for power modeling and estimation for all components of a system. The Operating System ...
Tao Li, Lizy Kurian John
CIKM
2001
Springer
14 years 1 months ago
PowerDB-IR - Information Retrieval on Top of a Database Cluster
Our current concern is a scalable infrastructure for information retrieval (IR) with up-to-date retrieval results in the presence of frequent, continuous updates. Timely processin...
Torsten Grabs, Klemens Böhm, Hans-Jörg S...