Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Program execution")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 963

  • Page / 39
Export

Selection :

  • and

Termination conventions and comparative semanticsHEHNER, E. C. R; MALTON, A. J.Acta informatica. 1988, Vol 25, Num 1, pp 1-14, issn 0001-5903Article

An experimental study to determine task size for Rollback recovery systemsUPADHYAYA, S. J; SALUJA, K. K.IEEE transactions on computers. 1988, Vol 37, Num 7, pp 872-877, issn 0018-9340Article

The complexity of monadic recursion schemes: executability problems, nesting depth, and applicationsHUNT, H. B. III; ROSENKRANTZ, D. J.Theoretical computer science. 1983, Vol 27, Num 1-2, pp 3-38, issn 0304-3975Article

GAMMATELLA : Visualization of program-execution data for deployed softwareORSO, Alessandro; JONES, James A; HARROLD, Mary Jean et al.International Conference on Software Engineering. 2004, pp 699-700, isbn 0-7695-2163-0, 1Vol, 2 p.Conference Paper

Flexible and efficient sandboxing based on fine-grained protection domainsSHINAGAWA, Takahiro; KONO, Kenji; MASUDA, Takashi et al.Lecture notes in computer science. 2003, pp 172-184, issn 0302-9743, isbn 3-540-00708-3, 13 p.Conference Paper

Multiuser-Software security = Sécurité du logiciel multiusager = Multiuser-software securityPOSCH, R.Angewandte Informatik. 1988, Vol 30, Num 5, pp 203-206, issn 0013-5704Article

HeapMD : Identifying heap-based bugs using anomaly detectionCHILIMBI, Trishul M; GANAPATHY, Vinod.Operating systems review. 2006, Vol 40, Num 5, pp 219-228, issn 0163-5980, 10 p.Conference Paper

Towards practical proofs of class correctnessMEYER, Bertrand.Lecture notes in computer science. 2003, pp 359-387, issn 0302-9743, isbn 3-540-40253-5, 29 p.Conference Paper

Identifying critical loads in real programs for decoupled VSM systemsZHU, H; WATSON, I.Lecture notes in computer science. 1997, pp 302-305, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Lambda-calcul et réseaux = Lambda-calculus and pure netsRegnier, Laurent; Girard, Jean-Yves.1992, 100 p.Thesis

Architecture based evolution of software systemsANDRADE, Luis Filipe; FIADEIRO, Josh Luiz.Lecture notes in computer science. 2003, pp 148-181, issn 0302-9743, isbn 3-540-20083-5, 34 p.Conference Paper

Bounding the minimal completion time of static mappings of multithreaded solaris programsLUNDBERG, L.Lecture notes in computer science. 1997, pp 1034-1038, issn 0302-9743, isbn 3-540-63440-1Conference Paper

Execution mechanism of Von Neumann program in data flow computerSOWA, M.Systems, computers, controls. 1984, Vol 15, Num 5, pp 27-32, issn 0096-8765Article

Using symbolic execution for verification of Ada tasking programsDILLON, L. K.ACM transactions on programming languages and systems. 1990, Vol 12, Num 4, pp 643-669, issn 0164-0925, 27 p.Article

The Promise and Challenge of Runtime VariabilityCAPILLA, Rafael; BOSCH, Jan.Computer (Long Beach, CA). 2011, Vol 44, Num 12, pp 93-95, issn 0018-9162, 3 p.Article

An evaluation of staged run-time optimizations in DyCGRANT, Brian; PHILIPOSE, Matthai; MOCK, Markus et al.ACM SIGPLAN notices. 2004, Vol 39, Num 4, pp 658-669, issn 1523-2867, 12 p.Article

Efficient monitoring of safety propertiesHAVELUND, Klaus; ROSU, Grigore.International journal on software tools for technology transfer (Print). 2004, Vol 6, Num 2, pp 158-173, issn 1433-2779, 16 p.Conference Paper

POETRIES: Performance oriented environment for transparent resource-management, implementing end-user parallel/distributed applicationsCESAR, Eduardo; MESA, J. G; SORRIBES, Joan et al.Lecture notes in computer science. 2003, pp 141-146, issn 0302-9743, isbn 3-540-40788-X, 6 p.Conference Paper

Types and effects for non-interfering program monitorsBAUER, Lujo; LIGATTI, Jarred; WALKER, David et al.Lecture notes in computer science. 2003, pp 154-171, issn 0302-9743, isbn 3-540-00708-3, 18 p.Conference Paper

Un modèle et un outil pour la programmation par aspects événementiels = A model and a tool for the event aspect programmingDOUENCE, Rémi; SÜDHOLT, Mario.L' Objet (Paris). 2003, Vol 9, Num 1-2, pp 105-117, issn 1262-1137, 13 p.Conference Paper

A new facility for dynamic control of program execution: DELIDESOLI, Giuseppe; MATEEV, Nikolay; DUESTERWALD, Evelyn et al.Lecture notes in computer science. 2002, pp 305-318, issn 0302-9743, isbn 3-540-44307-X, 14 p.Conference Paper

Traçage événementiel pour l'analyse d'exécutions réparties = Event tracing for distributed execution analysisOTTOGALLI, Francois-Gaël; VINCENT, Jean-Marc.Ecole thématique sur la globalisation des ressources informatiques et des données. 2002, pp 265-282, isbn 2-7261-1233-1, 18 p.Conference Paper

Return-address prediction in speculative multithreaded environmentsZAHRAN, Mohamed; FRANKLIN, Manoj.Lecture notes in computer science. 2002, pp 609-619, issn 0302-9743, isbn 3-540-00303-7, 11 p.Conference Paper

TINMAN: A resource bound security checking system for mobile codeMOK, Aloysius K; WEIJIANG YU.Lecture notes in computer science. 2002, pp 178-193, issn 0302-9743, isbn 3-540-44345-2, 16 p.Conference Paper

Local conditional high-level robot programsSARDINA, Sebastian.Lecture notes in computer science. 2001, pp 110-124, issn 0302-9743, isbn 3-540-42957-3Conference Paper

  • Page / 39