Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Program execution")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1442

  • Page / 58
Export

Selection :

  • and

Termination conventions and comparative semanticsHEHNER, E. C. R; MALTON, A. J.Acta informatica. 1988, Vol 25, Num 1, pp 1-14, issn 0001-5903Article

An experimental study to determine task size for Rollback recovery systemsUPADHYAYA, S. J; SALUJA, K. K.IEEE transactions on computers. 1988, Vol 37, Num 7, pp 872-877, issn 0018-9340Article

The complexity of monadic recursion schemes: executability problems, nesting depth, and applicationsHUNT, H. B. III; ROSENKRANTZ, D. J.Theoretical computer science. 1983, Vol 27, Num 1-2, pp 3-38, issn 0304-3975Article

survey of physical unit handling techniques in AdaGREIN, Christoph; KAZAKOV, Dmitry A; WILSON, Fraser et al.Lecture notes in computer science. 2003, pp 258-270, issn 0302-9743, isbn 3-540-40376-0, 13 p.Conference Paper

Improving processor performance by simplifying and bypassing trivial computationsYI, Joshua J; I, David J.Proceedings, IEEE International Conference on Computer Design. 2002, pp 462-465, issn 1063-6404, isbn 0-7695-1700-5, 4 p.Conference Paper

Piecewise execution of nested parallel programs : A thread-based approachPFANNENSTIEL, W.Lecture notes in computer science. 1999, pp 445-448, issn 0302-9743, isbn 3-540-66443-2Conference Paper

GAMMATELLA : Visualization of program-execution data for deployed softwareORSO, Alessandro; JONES, James A; HARROLD, Mary Jean et al.International Conference on Software Engineering. 2004, pp 699-700, isbn 0-7695-2163-0, 1Vol, 2 p.Conference Paper

Flexible and efficient sandboxing based on fine-grained protection domainsSHINAGAWA, Takahiro; KONO, Kenji; MASUDA, Takashi et al.Lecture notes in computer science. 2003, pp 172-184, issn 0302-9743, isbn 3-540-00708-3, 13 p.Conference Paper

Multiuser-Software security = Sécurité du logiciel multiusager = Multiuser-software securityPOSCH, R.Angewandte Informatik. 1988, Vol 30, Num 5, pp 203-206, issn 0013-5704Article

Applying decay strategies to branch predictors for leakage energy savingsZHIGANG HU; PHILO JUANG; SKADRON, Kevin et al.Proceedings, IEEE International Conference on Computer Design. 2002, pp 442-445, issn 1063-6404, isbn 0-7695-1700-5, 4 p.Conference Paper

Axiomatic semantics for «escape» statementsOLSSON, R. A; HUANG, D. T.Information processing letters. 1991, Vol 39, Num 1, pp 27-33, issn 0020-0190Article

HeapMD : Identifying heap-based bugs using anomaly detectionCHILIMBI, Trishul M; GANAPATHY, Vinod.Operating systems review. 2006, Vol 40, Num 5, pp 219-228, issn 0163-5980, 10 p.Conference Paper

Towards practical proofs of class correctnessMEYER, Bertrand.Lecture notes in computer science. 2003, pp 359-387, issn 0302-9743, isbn 3-540-40253-5, 29 p.Conference Paper

Identifying critical loads in real programs for decoupled VSM systemsZHU, H; WATSON, I.Lecture notes in computer science. 1997, pp 302-305, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Lambda-calcul et réseaux = Lambda-calculus and pure netsRegnier, Laurent; Girard, Jean-Yves.1992, 100 p.Thesis

Computational reflection for embedded Java systemsDI STEFANO, Antonella; FARGETTA, Marco; TRAMONTANA, Emiliano et al.Lecture notes in computer science. 2003, pp 437-450, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Fast bound consistency for the global cardinality constraintKATRIEL, Irit; THIEL, Sven.Lecture notes in computer science. 2003, pp 437-451, issn 0302-9743, isbn 3-540-20202-1, 15 p.Conference Paper

Efficient execution of nondeterministic parallel programs on asynchronous systemsAUMANN, Y; BENDER, M. A; ZHANG, L et al.Information and computation (Print). 1997, Vol 139, Num 1, pp 1-16, issn 0890-5401Article

Embedding continuations in procedural objectsHAYNES, C. T; FRIEDMAN, D. P.ACM transactions on programming languages and systems. 1987, Vol 9, Num 4, pp 582-598, issn 0164-0925Article

Cooperating reduction machinesKLUGE, W. E.IEEE transactions on computers. 1983, Vol 32, Num 11, pp 1002-1012, issn 0018-9340Article

Architecture based evolution of software systemsANDRADE, Luis Filipe; FIADEIRO, Josh Luiz.Lecture notes in computer science. 2003, pp 148-181, issn 0302-9743, isbn 3-540-20083-5, 34 p.Conference Paper

Bounding the minimal completion time of static mappings of multithreaded solaris programsLUNDBERG, L.Lecture notes in computer science. 1997, pp 1034-1038, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Execution mechanism of Von Neumann program in data flow computerSOWA, M.Systems, computers, controls. 1984, Vol 15, Num 5, pp 27-32, issn 0096-8765Article

Using symbolic execution for verification of Ada tasking programsDILLON, L. K.ACM transactions on programming languages and systems. 1990, Vol 12, Num 4, pp 643-669, issn 0164-0925, 27 p.Article

The Promise and Challenge of Runtime VariabilityCAPILLA, Rafael; BOSCH, Jan.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 93-95, issn 0018-9162, 3 p.Article

  • Page / 58