Sciweavers

4233 search results - page 54 / 847
» Three Paths to Effectiveness
Sort
View
130
Voted
QSIC
2008
IEEE
15 years 10 months ago
Path and Context Sensitive Inter-procedural Memory Leak Detection
This paper presents a practical path and context sensitive inter-procedural analysis method for detecting memory leaks in C programs. A novel memory object model and function summ...
Zhongxing Xu, Jian Zhang
126
Voted
SEMWEB
2007
Springer
15 years 9 months ago
Change Paths in Reasoning!
Millions of research funding has been put down to develop - what I call - old forms - of reasoning that are characterized by strong focus on theoretical properties and strict adher...
Raphael Volz
114
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Delivery Properties of Human Social Networks
—The recently proposed Pocket Switched Network paradigm takes advantage of human social contacts to opportunistically create data paths over time. We examine how effective such a...
Nishanth Sastry, Karen R. Sollins, Jon Crowcroft
125
Voted
ICIW
2009
IEEE
15 years 10 months ago
QoSMap: Achieving Quality and Resilience through Overlay Construction
We describe QoSMap, an overlay construction mechanism which computes high quality overlay networks for applications having stringent constraints on hop-degrading QoS metrics and p...
Jawwad Shamsi, Monica Brockmeyer
119
Voted
DATE
2007
IEEE
130views Hardware» more  DATE 2007»
15 years 10 months ago
A novel criticality computation method in statistical timing analysis
Abstract— The impact of process variations increases as technology scales to nanometer region. Under large process variations, the path and arc/node criticality [18] provide effe...
Feng Wang 0004, Yuan Xie, Hai Ju