Sciweavers

6885 search results - page 1342 / 1377
» The micro-structure of use of help
Sort
View
NSDI
2008
13 years 10 months ago
Hot Crap!
esn't display abstracts. Similar issues beset START (www.softconf.com), Linklings's RM 3.2 (www. linklings.com), and EasyChair (www.easychair.org). For instance, EasyChai...
Eddie Kohler
USENIX
2008
13 years 10 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
ATAL
2008
Springer
13 years 9 months ago
Resource limitations, transmission costs and critical thresholds in scale-free networks
Whether or not a critical threshold exists when epidemic diseases are spread in complex networks is a problem attracting attention from researchers in several disciplines. In 2001...
Chung-Yuan Huang, Chuen-Tsai Sun, Chia-Ying Cheng,...
ATAL
2008
Springer
13 years 9 months ago
Multi-agent plan diagnosis and negotiated repair
In the complex, dynamic domain of Air Traffic Control (ATC) many unexpected events can happen during the execution of a plan. Sometimes these disruptions make the plan infeasible ...
Huib Aldewereld, Pieter Buzing, Geert Jonker
ISPASS
2010
IEEE
13 years 9 months ago
Understanding transactional memory performance
Abstract—Transactional memory promises to generalize transactional programming to mainstream languages and data structures. The purported benefit of transactions is that they ar...
Donald E. Porter, Emmett Witchel
« Prev « First page 1342 / 1377 Last » Next »