Sciweavers

6885 search results - page 1324 / 1377
» The micro-structure of use of help
Sort
View
PLDI
2003
ACM
14 years 3 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
SENSYS
2003
ACM
14 years 3 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
14 years 3 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
SIGECOM
2003
ACM
122views ECommerce» more  SIGECOM 2003»
14 years 3 months ago
On polynomial-time preference elicitation with value queries
Preference elicitation — the process of asking queries to determine parties’ preferences — is a key part of many problems in electronic commerce. For example, a shopping age...
Martin Zinkevich, Avrim Blum, Tuomas Sandholm
SIGUCCS
2003
ACM
14 years 3 months ago
Escaping the quicksand and getting back on the trail of team projects
Working in a team environment can be either an efficient and productive means of completing projects or a nightmare where the project never seems to end. Most of us have been a pa...
Steven K. Brawn, Kelly Caye, R. Mark Koan
« Prev « First page 1324 / 1377 Last » Next »