Sciweavers

1687 search results - page 13 / 338
» Which pointer analysis should I use
Sort
View
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
PPSN
2010
Springer
13 years 5 months ago
Benchmarking Evolutionary Algorithms: Towards Exploratory Landscape Analysis
We present methods to answer two basic questions that arise when benchmarking optimization algorithms. The first one is: which algorithm is the `best' one? and the second one:...
Olaf Mersmann, Mike Preuss, Heike Trautmann
POPL
2005
ACM
14 years 8 months ago
Region-based shape analysis with tracked locations
This paper proposes a novel approach to shape analysis: using local reasoning about individual heap locations of global reasoning about entire heap abstractions. We present an int...
Brian Hackett, Radu Rugina
CLEF
2009
Springer
13 years 5 months ago
Overview of iCLEF 2009: Exploring Search Behaviour in a Multilingual Folksonomy Environment
This paper summarises activities from the iCLEF 2009 task. As in 2008, the task was organised based on users participating in an interactive cross-language image search experiment...
Julio Gonzalo, Víctor Peinado, Paul Clough,...
ECSCW
2003
13 years 9 months ago
When Can I Expect an Email Response? A Study of Rhythms in Email Usage
A study of email responsiveness was conducted to understand how the timing of email responses conveys important information. Interviews and observations explored users’ perceptio...
Joshua R. Tyler, John C. Tang