Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Flot commande")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 225

  • Page / 9
Export

Selection :

  • and

Rewriting executable files to measure program behaviorLARUS, J. R; BALL, T.Software, practice & experience. 1994, Vol 24, Num 2, pp 197-218, issn 0038-0644Article

Lokale Optimierung ausnahmebehafteter Programme durch SpuroptimierungBOUILLON, P. G; SANDER, G; WILHELM, R et al.Informatik (Berlin, West). 1994, Vol 9, Num 2, pp 72-81, issn 0178-3564Article

Dynamic control of session input rates in communication networksGAFNI, E. M; BERTSEKAS, D. P.IEEE transactions on automatic control. 1984, Vol 29, Num 11, pp 1009-1016, issn 0018-9286Article

An evaluation of flow control capability by window scheme in computer networkSAITO, T; KOBAYASHI, S; INOSE, H et al.Systems, computers, controls. 1983, Vol 14, Num 2, pp 28-37, issn 0096-8765Article

Handling irreducible loops : Optimized node splitting vs. DJ-graphsUNGER, Sebastian; MUELLER, Frank.Lecture notes in computer science. 2001, Vol 2150, pp 207-220, issn 0302-9743, isbn 3-540-42495-4Conference Paper

Static Reduction Analysis for imperative object oriented languagesBARTHE, Gilles; SERPETTE, Bernard Paul.Lecture notes in computer science. 2000, pp 344-361, issn 0302-9743, isbn 3-540-41285-9Conference Paper

Validating firewalls in mobile ambientsNIELSON, F; NIELSON, H. R; HANSEN, R. R et al.Lecture notes in computer science. 1999, pp 463-477, issn 0302-9743, isbn 3-540-66425-4Conference Paper

On-the-fly analysis of distributed computationsFROMENTIN, E; JARD, C; JOURDAN, G.-V et al.Information processing letters. 1995, Vol 54, Num 5, pp 267-274, issn 0020-0190Article

An explicity declared delayed-branch mechanism for a superscalar architectureCOLLINS, R; STEVEN, G.Microprocessing and microprogramming. 1994, Vol 40, Num 10-12, pp 677-680, issn 0165-6074Conference Paper

Language- and machine-independent global optimization on intermediate codeBAL, H. E; TANENBAUM, A. S.Computer languages. 1986, Vol 11, Num 2, pp 105-121, issn 0096-0551Article

Better slicing of programs with jumps and switchesKUMAR, Sumit; HORWITZ, Susan.Lecture notes in computer science. 2002, pp 96-112, issn 0302-9743, isbn 3-540-43353-8Conference Paper

Tool demonstration : Finding duplicated code using program dependencesKOMONDOOR, Raghavan; HORWITZ, Susan.Lecture notes in computer science. 2001, pp 383-386, issn 0302-9743, isbn 3-540-41862-8Conference Paper

Temporary arrays for distribution of loops with control dependencesDARTE, A; SILBER, G.-A.Lecture notes in computer science. 2000, pp 357-367, issn 0302-9743, isbn 3-540-67956-1Conference Paper

A full program control flow representation for real programsZHU, H; WATSON, I.Lecture notes in computer science. 1997, pp 162-165, issn 0302-9743, isbn 3-540-63440-1Conference Paper

An architectural meta-application model for coarse grained metacomputingKINDERMANN, S; FINK, T.Lecture notes in computer science. 2000, pp 1223-1230, issn 0302-9743, isbn 3-540-67956-1Conference Paper

Safe ambients : Control Flow Analysis and securityDEGANO, Pierpaolo; LEVI, Francesca; BODEI, Chiara et al.Lecture notes in computer science. 2000, pp 199-214, issn 0302-9743, isbn 3-540-41428-2Conference Paper

Properties of control-flow complexity measuresLAKSHMANAN, K. B; JAYAPRAKASH, S; SINHA, P. K et al.IEEE transactions on software engineering. 1991, Vol 17, Num 12, pp 1289-1295, issn 0098-5589Article

A roving monitoring processor for detection of control flow errors in multiple processor systemsSHEN, J. P; TOMAS, S. P.Microprocessing and microprogramming. 1987, Vol 20, Num 4-5, pp 249-269, issn 0165-6074Article

Concurrent process monitoring with no reference signaturesUPADHYAYA, S. J; RMAMURTHY, B.IEEE transactions on computers. 1994, Vol 43, Num 4, pp 475-480, issn 0018-9340Article

An optimal graph-construction approach to placing program signatures for signature monitoringWILKEN, K. D.IEEE transactions on computers. 1993, Vol 42, Num 11, pp 1372-1381, issn 0018-9340Article

A VIEW OF COROUTINES.GRUNE D.1977; SIGPLAN NOT.; U.S.A.; DA. 1977; VOL. 12; NO 7; PP. 75-81; BIBL. 5 REF.Article

FLOW OF CONTROL IN THE PROOF THEORY OF STRUCTURED PROGRAMMING.DE BAKKER JW.1975; IN: ANNU. SYMP. FOUND. COMPUT. SCI. 16; BERKELEY, CALIF.; 1975; NEW YORK; INST. ELECTR. ELECTRON. ENG.; DA. 1975; PP. 29-33; BIBL. 14 REF.Conference Paper

CONTROL FLOW COMPLEXITY AND STRUCTUREDNESS OF PROGRAMSSRINIVASAN B; GOPALAKRISHNA V.1979; SIGPLAN NOT.; USA; DA. 1979; VOL. 14; NO 11; PP. 110-115; BIBL. 7 REF.Article

Typing the ISA to cluster the processorGOOSSENS, Bernard.Lecture notes in computer science. 2001, pp 232-242, issn 0302-9743, isbn 3-540-42522-5Conference Paper

A COMPARISON OF MEASURES OF CONTROL FLOW COMPLEXITYBAKER AL; ZWEBEN SH.1980; I.E.E.E. TRANS. SOFTWARE ENGNG; USA; DA. 1980; VOL. 6; NO 6; PP. 506-512; BIBL. 22 REF.Article

  • Page / 9