Sciweavers

1781 search results - page 286 / 357
» Visualizing program execution using user abstractions
Sort
View
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 8 months ago
Complexity in scalable computing
f abstraction (hardware) to the highest (people). This issue's theme encompasses this entire spectrum. The lead author of each article resides in the Scalable Computing Resear...
Damian W. I. Rouson
PLDI
2003
ACM
14 years 2 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
GI
2009
Springer
13 years 6 months ago
Spontaneous and Privacy-friendly Mobile Indoor Routing and Navigation
Abstract: Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, offi...
Peter Ruppel, Florian Gschwandtner
ISVLSI
2006
IEEE
89views VLSI» more  ISVLSI 2006»
14 years 2 months ago
System Exploration of SystemC Designs
Due to increasing design complexity new methodologies for system modeling have been established in VLSI CAD. The SystemC methodology gains a significant reduction of design cycle...
Christian Genz, Rolf Drechsler
CE
2008
160views more  CE 2008»
13 years 9 months ago
Data mining in course management systems: Moodle case study and tutorial
Educational data mining is an emerging discipline, concerned with developing methods for exploring the unique types of data that come from the educational context. This work is a ...
Cristóbal Romero, Sebastián Ventura,...