Sciweavers

2286 search results - page 373 / 458
» Statistical timing analysis based on a timing yield model
Sort
View
MOBICOM
2004
ACM
15 years 10 months ago
On k-coverage in a mostly sleeping sensor network
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors to sleep for most of their ...
Santosh Kumar, Ten-Hwang Lai, József Balogh
156
Voted
ICSE
2005
IEEE-ACM
16 years 4 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball
280
Voted
POPL
2007
ACM
16 years 4 months ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley
JOT
2008
228views more  JOT 2008»
15 years 4 months ago
Adapting the User Interface of Integrated Development Environments (IDEs) for Novice Users
The usability of a user interface is often neglected in the design and development of software applications. An Integrated Development Environment (IDE) is prone to poor usability...
Ying Zou, Michael Lerner, Alex Leung, Scott Moriss...
133
Voted
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
15 years 10 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer