Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Ejecución programa")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1291

  • Page / 52
Export

Selection :

  • and

Termination conventions and comparative semanticsHEHNER, E. C. R; MALTON, A. J.Acta informatica. 1988, Vol 25, Num 1, pp 1-14, issn 0001-5903Article

An experimental study to determine task size for Rollback recovery systemsUPADHYAYA, S. J; SALUJA, K. K.IEEE transactions on computers. 1988, Vol 37, Num 7, pp 872-877, issn 0018-9340Article

Improving processor performance by simplifying and bypassing trivial computationsYI, Joshua J; I, David J.Proceedings, IEEE International Conference on Computer Design. 2002, pp 462-465, issn 1063-6404, isbn 0-7695-1700-5, 4 p.Conference Paper

Piecewise execution of nested parallel programs : A thread-based approachPFANNENSTIEL, W.Lecture notes in computer science. 1999, pp 445-448, issn 0302-9743, isbn 3-540-66443-2Conference Paper

survey of physical unit handling techniques in AdaGREIN, Christoph; KAZAKOV, Dmitry A; WILSON, Fraser et al.Lecture notes in computer science. 2003, pp 258-270, issn 0302-9743, isbn 3-540-40376-0, 13 p.Conference Paper

GAMMATELLA : Visualization of program-execution data for deployed softwareORSO, Alessandro; JONES, James A; HARROLD, Mary Jean et al.International Conference on Software Engineering. 2004, pp 699-700, isbn 0-7695-2163-0, 1Vol, 2 p.Conference Paper

Flexible and efficient sandboxing based on fine-grained protection domainsSHINAGAWA, Takahiro; KONO, Kenji; MASUDA, Takashi et al.Lecture notes in computer science. 2003, pp 172-184, issn 0302-9743, isbn 3-540-00708-3, 13 p.Conference Paper

Multiuser-Software security = Sécurité du logiciel multiusager = Multiuser-software securityPOSCH, R.Angewandte Informatik. 1988, Vol 30, Num 5, pp 203-206, issn 0013-5704Article

HeapMD : Identifying heap-based bugs using anomaly detectionCHILIMBI, Trishul M; GANAPATHY, Vinod.Operating systems review. 2006, Vol 40, Num 5, pp 219-228, issn 0163-5980, 10 p.Conference Paper

Towards practical proofs of class correctnessMEYER, Bertrand.Lecture notes in computer science. 2003, pp 359-387, issn 0302-9743, isbn 3-540-40253-5, 29 p.Conference Paper

Identifying critical loads in real programs for decoupled VSM systemsZHU, H; WATSON, I.Lecture notes in computer science. 1997, pp 302-305, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Lambda-calcul et réseaux = Lambda-calculus and pure netsRegnier, Laurent; Girard, Jean-Yves.1992, 100 p.Thesis

Computational reflection for embedded Java systemsDI STEFANO, Antonella; FARGETTA, Marco; TRAMONTANA, Emiliano et al.Lecture notes in computer science. 2003, pp 437-450, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Fast bound consistency for the global cardinality constraintKATRIEL, Irit; THIEL, Sven.Lecture notes in computer science. 2003, pp 437-451, issn 0302-9743, isbn 3-540-20202-1, 15 p.Conference Paper

Efficient execution of nondeterministic parallel programs on asynchronous systemsAUMANN, Y; BENDER, M. A; ZHANG, L et al.Information and computation (Print). 1997, Vol 139, Num 1, pp 1-16, issn 0890-5401Article

Embedding continuations in procedural objectsHAYNES, C. T; FRIEDMAN, D. P.ACM transactions on programming languages and systems. 1987, Vol 9, Num 4, pp 582-598, issn 0164-0925Article

Applying decay strategies to branch predictors for leakage energy savingsZHIGANG HU; PHILO JUANG; SKADRON, Kevin et al.Proceedings, IEEE International Conference on Computer Design. 2002, pp 442-445, issn 1063-6404, isbn 0-7695-1700-5, 4 p.Conference Paper

Axiomatic semantics for «escape» statementsOLSSON, R. A; HUANG, D. T.Information processing letters. 1991, Vol 39, Num 1, pp 27-33, issn 0020-0190Article

Architecture based evolution of software systemsANDRADE, Luis Filipe; FIADEIRO, Josh Luiz.Lecture notes in computer science. 2003, pp 148-181, issn 0302-9743, isbn 3-540-20083-5, 34 p.Conference Paper

Bounding the minimal completion time of static mappings of multithreaded solaris programsLUNDBERG, L.Lecture notes in computer science. 1997, pp 1034-1038, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Using symbolic execution for verification of Ada tasking programsDILLON, L. K.ACM transactions on programming languages and systems. 1990, Vol 12, Num 4, pp 643-669, issn 0164-0925, 27 p.Article

Self-Adaptive Software Needs Quantitative Verification at RuntimeCALINESCU, Radu; GHEZZI, Carlo; KWIATKOWSKA, Marta et al.Communications of the ACM. 2012, Vol 55, Num 9, pp 69-77, issn 0001-0782, 9 p.Article

A basic taxonomy for role compositionSTEEGMANS, Elke; SCHELFTHOUT, Kurt; HOLVOET, Tom et al.Software engineering for multi-agent systems II : research issues and practical applications. Lecture notes in computer science. 2004, pp 92-110, issn 0302-9743, isbn 3-540-21182-9, 19 p.Book Chapter

Managing C++ OpenMP code and its exception handlingKAO, Shi-Jung.Lecture notes in computer science. 2003, pp 227-243, issn 0302-9743, isbn 3-540-40435-X, 17 p.Conference Paper

The implementation of ASSIST, an environment for parallel and distributed programmingALDINUCCI, Marco; CAMPA, Sonia; ZOCCOLO, Corrado et al.Lecture notes in computer science. 2003, pp 712-721, issn 0302-9743, isbn 3-540-40788-X, 10 p.Conference Paper

  • Page / 52