Sciweavers

15351 search results - page 2957 / 3071
» The information bottleneck method
Sort
View
ASPLOS
2006
ACM
14 years 4 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
HT
2006
ACM
14 years 4 months ago
Social navigation in web lectures
Web lectures are a form of educational content that differs from classic hypertext in a number of ways. Web lectures are easier to produce and therefore large amounts of material ...
Robert Mertens, Rosta Farzan, Peter Brusilovsky
MIR
2006
ACM
120views Multimedia» more  MIR 2006»
14 years 4 months ago
Scalable search-based image annotation of personal images
With the prevalence of digital cameras, more and more people have considerable digital images on their personal devices. As a result, there are increasing needs to effectively sea...
Changhu Wang, Feng Jing, Lei Zhang, HongJiang Zhan...
MSR
2006
ACM
14 years 4 months ago
MAPO: mining API usages from open source repositories
To improve software productivity, when constructing new software systems, developers often reuse existing class libraries or frameworks by invoking their APIs. Those APIs, however...
Tao Xie, Jian Pei
PLDI
2006
ACM
14 years 4 months ago
Free-Me: a static analysis for automatic individual object reclamation
Garbage collection has proven benefits, including fewer memoryrelated errors and reduced programmer effort. Garbage collection, however, trades space for time. It reclaims memory...
Samuel Z. Guyer, Kathryn S. McKinley, Daniel Framp...
« Prev « First page 2957 / 3071 Last » Next »