Sciweavers

29 search results - page 4 / 6
» ccr 2000
Sort
View
JCSS
2000
71views more  JCSS 2000»
13 years 7 months ago
Path Constraints in Semistructured Databases
We investigate a class of path constraints that is of interest in connection with both semistructured and structured data. In standard database systems, constraints are typically ...
Peter Buneman, Wenfei Fan, Scott Weinstein
CC
2000
Springer
100views System Software» more  CC 2000»
13 years 12 months ago
A Static Study of Java Exceptions Using JESP
JESP is a tool for statically examining the usage of user thrown exceptions in Java source code. Reported here are the first findings over a dataset of 31 publicly available Java...
Barbara G. Ryder, Donald Smith, Ulrich Kremer, Mic...
KONVENS
2000
13 years 11 months ago
A Noise Suppression System for the AMR Speech Codec
In this paper we describe a noise reduction preprocessing algorithm for the adaptive multirate (AMR) speech codec of the GSM system. The algorithm is based on spectral weighting a...
Peter Jax, Rainer Martin, Peter Vary, Marc Adrat, ...
JPDC
2000
95views more  JPDC 2000»
13 years 7 months ago
Permutation Capability of Optical Multistage Interconnection Networks
In this paper, we study optical multistage interconnection networks (MINs). Advances in electro-optic technologies have made optical communication a promising networking choice to...
Yuanyuan Yang, Jianchao Wang, Yi Pan
ASPLOS
2006
ACM
14 years 1 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley