Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,673,918 papers from all fields of science
Search
Sign In
Create Free Account
Memory leak
Known as:
Memory leaks
, Storage leak
, Leakage (computer science)
Expand
In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations in such a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Automatic bug fixing
Bcheck
BoundsChecker
Cache (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2006
2006
Improved Illumination Estimation for Photon Maps in Architectural Scenes
R. Tobler
,
S. Maierhofer
2006
Corpus ID: 1535276
The photon map algorithm provides a number of advantages for fast global illumination algorithms. In order to calculate the…
Expand
2005
2005
IgProf profiling tool
G. Eulisse
,
L. Tuura
2005
Corpus ID: 55797507
A fundamental part of software development is to detect and analyse weak spots of the programs to guide optimisation efforts…
Expand
2003
2003
A 90 nm low power 32 K-byte embedded SRAM with gate leakage suppression circuit for mobile applications
K. Nii
,
Y. Tenoh
,
+7 authors
S. Iwade
Symposium on VLSI Circuits. Digest of Technical…
2003
Corpus ID: 64882699
In sub 100 nm generation, gate tunneling leak current increases and dominates total standby leak current of LSI based on…
Expand
Highly Cited
1999
Highly Cited
1999
Performance of a 1-MVA HTS demonstration transformer
S.W. Schwenerly
,
B. Mcconnell
,
+29 authors
S. Salon
IEEE transactions on applied superconductivity
1999
Corpus ID: 19040136
We report on test results for a single phase, 60-Hz, 13.8 kV/6.9 kV, 1-MVA high temperature superconducting (HTS) transformer…
Expand
1999
1999
Design of oil pipeline leak detection and communication system based on optical fiber technology
Yaqing Tu
,
Huabo Chen
Optical Systems Design
1999
Corpus ID: 109898468
The integrity of oil pipeline is always a major concern of operators. Pipeline leak not only leads to loss of oil, but pollutes…
Expand
1999
1999
The Levitated Dipole Experiment (LDX) magnet system
J. Schultz
,
J. Kesner
,
+10 authors
D. Garnier
IEEE transactions on applied superconductivity
1999
Corpus ID: 33690888
In the Levitated Dipole Experiment (LDX), a hot plasma is formed about a levitating superconducting dipole magnet in the center…
Expand
1998
1998
A model-based thruster leakage monitor for the Cassini spacecraft
A.Y. Lee
,
M. J. Brown
Proceedings of the American Control Conference…
1998
Corpus ID: 111084352
The Cassini spacecraft uses thrusters to maintain three-axis attitude control and to perform many other functions. If one of the…
Expand
1997
1997
One dimensional simulation for Peltier current leads
H. Okumura
,
S. Yamaguchi
IEEE transactions on applied superconductivity
1997
Corpus ID: 1438491
Current leads, which connect superconducting magnets at the liquid helium temperature and power supplies at the room temperature…
Expand
Review
1997
Review
1997
Selective Culling of Discontinuity Lines
D. Hedley
,
Adam D. Worrall
,
D. Paddon
Rendering Techniques
1997
Corpus ID: 1637695
In recent years discontinuity meshing has become an important part of mesh-based solutions to the global illumination problem…
Expand
Highly Cited
1987
Highly Cited
1987
Fixing some space leaks with a garbage collector
P. Wadler
Software, Practice & Experience
1987
Corpus ID: 12832197
Some functional programs may use more space than would be expected. A modification to the garbage collector is suggested which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE