Sciweavers

917 search results - page 87 / 184
» The Generalized Trace-Norm and its Application to Structure-...
Sort
View
ISSTA
2012
ACM
11 years 11 months ago
Static memory leak detection using full-sparse value-flow analysis
We introduce a static detector, Saber, for detecting memory leaks in C programs. Leveraging recent advances on sparse pointer analysis, Saber is the first to use a full-sparse va...
Yulei Sui, Ding Ye, Jingling Xue
TKDE
2012
270views Formal Methods» more  TKDE 2012»
11 years 11 months ago
Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering
—Traditional clustering techniques are inapplicable to problems where the relationships between data points evolve over time. Not only is it important for the clustering algorith...
Lijun Wang, Manjeet Rege, Ming Dong, Yongsheng Din...
ICAPR
2005
Springer
14 years 2 months ago
Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text
Abstract. Software analysis techniques, and in particular software “design recovery”, have been highly successful at both technical and businesslevel semantic markup of large s...
Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy,...
LATIN
2010
Springer
14 years 2 months ago
Euclidean Prize-Collecting Steiner Forest
In this paper, we consider Steiner forest and its generalizations, prize-collecting Steiner forest and k-Steiner forest, when the vertices of the input graph are points in the Euc...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi
ATAL
2010
Springer
13 years 10 months ago
Making norms concrete
In systems based on organisational specifications a reoccurring problem remains to be solved in the disparity between the level of abstractness of the organisational concepts and ...
Huib Aldewereld, Sergio Álvarez-Napagao, Fr...