Sciweavers

1368 search results - page 243 / 274
» Understanding Software Systems Using Reverse Engineering Tec...
Sort
View
PLDI
2003
ACM
15 years 7 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
EDBTW
2010
Springer
15 years 5 months ago
Text-to-query: dynamically building structured analytics to illustrate textual content
Successfully structuring information in databases, OLAP cubes, and XML is a crucial element in managing data nowadays. However this process brought new challenges to usability. It...
Raphaël Thollot, Falk Brauer, Wojciech M. Bar...
AVI
2004
15 years 3 months ago
Integrating expanding annotations with a 3D explosion probe
Understanding complex 3D virtual models can be difficult, especially when the model has interior components not initially visible and ancillary text. We describe new techniques fo...
Henry Sonnet, M. Sheelagh T. Carpendale, Thomas St...
PAMI
2012
13 years 4 months ago
A Tree-Based Context Model for Object Recognition
—There has been a growing interest in exploiting contextual information in addition to local features to detect and localize multiple object categories in an image. A context mod...
Myung Jin Choi, Antonio Torralba, Alan S. Willsky
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
15 years 8 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...