Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Exécution programme")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 985

  • Page / 40
Export

Selection :

  • and

Termination conventions and comparative semanticsHEHNER, E. C. R; MALTON, A. J.Acta informatica. 1988, Vol 25, Num 1, pp 1-14, issn 0001-5903Article

An experimental study to determine task size for Rollback recovery systemsUPADHYAYA, S. J; SALUJA, K. K.IEEE transactions on computers. 1988, Vol 37, Num 7, pp 872-877, issn 0018-9340Article

The complexity of monadic recursion schemes: executability problems, nesting depth, and applicationsHUNT, H. B. III; ROSENKRANTZ, D. J.Theoretical computer science. 1983, Vol 27, Num 1-2, pp 3-38, issn 0304-3975Article

Reduction of SOC test data volume, scan power and testing time using alternating run-length codesCHANDRA, Anshuman; CHAKRABARTY, Krishnendu.Design automation conference. 2002, pp 669-672, isbn 1-58113-461-4, 4 p.Conference Paper

GAMMATELLA : Visualization of program-execution data for deployed softwareORSO, Alessandro; JONES, James A; HARROLD, Mary Jean et al.International Conference on Software Engineering. 2004, pp 699-700, isbn 0-7695-2163-0, 1Vol, 2 p.Conference Paper

Flexible and efficient sandboxing based on fine-grained protection domainsSHINAGAWA, Takahiro; KONO, Kenji; MASUDA, Takashi et al.Lecture notes in computer science. 2003, pp 172-184, issn 0302-9743, isbn 3-540-00708-3, 13 p.Conference Paper

Multiuser-Software security = Sécurité du logiciel multiusager = Multiuser-software securityPOSCH, R.Angewandte Informatik. 1988, Vol 30, Num 5, pp 203-206, issn 0013-5704Article

Pruning interference and ready dependence for slicing concurrent Java programsVENKATESH PRASAD RANGANATH; HATCLIFF, John.Lecture notes in computer science. 2004, pp 39-56, issn 0302-9743, isbn 3-540-21297-3, 18 p.Conference Paper

Efficient state representation for symbolic simulationBERTACCO, Valeria; OLUKOTUN, Kunle.Design automation conference. 2002, pp 99-104, isbn 1-58113-461-4, 6 p.Conference Paper

HeapMD : Identifying heap-based bugs using anomaly detectionCHILIMBI, Trishul M; GANAPATHY, Vinod.Operating systems review. 2006, Vol 40, Num 5, pp 219-228, issn 0163-5980, 10 p.Conference Paper

Towards practical proofs of class correctnessMEYER, Bertrand.Lecture notes in computer science. 2003, pp 359-387, issn 0302-9743, isbn 3-540-40253-5, 29 p.Conference Paper

Identifying critical loads in real programs for decoupled VSM systemsZHU, H; WATSON, I.Lecture notes in computer science. 1997, pp 302-305, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Lambda-calcul et réseaux = Lambda-calculus and pure netsRegnier, Laurent; Girard, Jean-Yves.1992, 100 p.Thesis

Architecture based evolution of software systemsANDRADE, Luis Filipe; FIADEIRO, Josh Luiz.Lecture notes in computer science. 2003, pp 148-181, issn 0302-9743, isbn 3-540-20083-5, 34 p.Conference Paper

Bounding the minimal completion time of static mappings of multithreaded solaris programsLUNDBERG, L.Lecture notes in computer science. 1997, pp 1034-1038, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Execution mechanism of Von Neumann program in data flow computerSOWA, M.Systems, computers, controls. 1984, Vol 15, Num 5, pp 27-32, issn 0096-8765Article

Using symbolic execution for verification of Ada tasking programsDILLON, L. K.ACM transactions on programming languages and systems. 1990, Vol 12, Num 4, pp 643-669, issn 0164-0925, 27 p.Article

Self-Adaptive Software Needs Quantitative Verification at RuntimeCALINESCU, Radu; GHEZZI, Carlo; KWIATKOWSKA, Marta et al.Communications of the ACM. 2012, Vol 55, Num 9, pp 69-77, issn 0001-0782, 9 p.Article

A basic taxonomy for role compositionSTEEGMANS, Elke; SCHELFTHOUT, Kurt; HOLVOET, Tom et al.Software engineering for multi-agent systems II : research issues and practical applications. Lecture notes in computer science. 2004, pp 92-110, issn 0302-9743, isbn 3-540-21182-9, 19 p.Book Chapter

Managing C++ OpenMP code and its exception handlingKAO, Shi-Jung.Lecture notes in computer science. 2003, pp 227-243, issn 0302-9743, isbn 3-540-40435-X, 17 p.Conference Paper

Decomposable algorithms for computing minimum spanning treeKHEDR, Ahmed; BHATNAGAR, Raj.Lecture notes in computer science. 2003, pp 33-44, issn 0302-9743, isbn 3-540-20745-7, 12 p.Conference Paper

The implementation of ASSIST, an environment for parallel and distributed programmingALDINUCCI, Marco; CAMPA, Sonia; ZOCCOLO, Corrado et al.Lecture notes in computer science. 2003, pp 712-721, issn 0302-9743, isbn 3-540-40788-X, 10 p.Conference Paper

An infrastructure for adaptable middlewareDAVID, Pierre-Charles; LEDOUX, Thomas.Lecture notes in computer science. 2002, pp 773-790, issn 0302-9743, isbn 3-540-00106-9, 18 p.Conference Paper

Using RAIC for dependable on-line upgrading of distributed systemsCHANG LIU; RICHARDSON, Debra J.Proceedings - International Computer Software & Applications Conference. 2002, pp 1006-1011, isbn 0-7695-1727-7, 6 p.Conference Paper

A sequent calculus for first-order Dynamic Logic with trace modalitiesBECKERT, Bernhard; SCHLAGER, Steffen.Lecture notes in computer science. 2001, pp 626-641, issn 0302-9743, isbn 3-540-42254-4Conference Paper

  • Page / 40