Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,470,258 papers from all fields of science
Search
Sign In
Create Free Account
Memory leak
Known as:
Memory leaks
, Storage leak
, Leakage (computer science)
Expand
In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations in such a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Automatic bug fixing
Bcheck
BoundsChecker
Cache (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
An investigation of leaky sewers as a source of fecal contamination in the stormwater drainage system in Singapore
J. Doshi
2012
Corpus ID: 107069059
A preliminary investigation was conducted into possible pathways for fecal contamination to enter stormwater drains from leaky…
Expand
2011
2011
Lesiones de la vía biliar: Prevalencia en pacientes con colecistectomía laparoscópica en un hospital de especialidades
Jorge Octavio Gutiérrez Pérez
,
P. M. García
,
Sergio Fernando Ortiz Reyes
,
Hiram Efraín Lozano Cervantes
2011
Corpus ID: 53915401
Objetivo: Conocer la prevalencia de lesion de la via biliar por colecistectomia laparoscopica y compararla con la prevalencia…
Expand
2010
2010
A trustworthiness-based distribution model for data leakage prevention
Yingjie Fan
,
Yu Wang
,
Lina Wang
,
Rongwei Yu
Wuhan University Journal of Natural Sciences
2010
Corpus ID: 44323265
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution…
Expand
2008
2008
ACOUSTIC EMISSION LEAK TESTING OF PIPES FOR PRESSURIZED GAS USING ACTIVE FIBER COMPOSITE ELEMENTS AS SENSORS
A. Brunner
,
M. Barbezat
2008
Corpus ID: 150376598
In order to explore potential acoustic emission (AE) applications for piezoelectric activefiber-composite (AFC) sensor elements…
Expand
2005
2005
IgProf profiling tool
G. Eulisse
,
L. Tuura
2005
Corpus ID: 55797507
A fundamental part of software development is to detect and analyse weak spots of the programs to guide optimisation efforts…
Expand
2002
2002
Memory leak detection in embedded systems
Cal Erickson
2002
Corpus ID: 61282599
Erickson discusses some of the best tools for memory leak detectionfor embedded programmers.
2000
2000
Capillary leak. Pathogenesis and treatment.
Webb Ar
2000
Corpus ID: 77360226
1996
1996
Pipeline Integrity Monitoring System for Leak Detection, Control, and Optimization of Wet Gas Pipelines
D. Erickson
,
David Twaite
1996
Corpus ID: 58712335
A combined leak-detection, gas-composition-tracking system, PIMS, has been developed, installed and operated for two wet-gas…
Expand
1994
1994
The importance of leaky levels for behavior-based AI
G. M. Saunders
,
J. Kolen
,
J. Pollack
1994
Corpus ID: 18492817
From the many possible perspectives in which an agent may be viewed, behavior-based AI selects observable actions as a…
Expand
Review
1992
Review
1992
A Review of Pipeline Leak Detection Technology
P. Black
1992
Corpus ID: 130546298
There has long been a recognition of the importance of pipeline leak detection in oil and gas transportation, an importance not…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE