QuoteRef: abadM1_1993 ;;Abadi, Lamport, Composing specifications
|
QuoteRef: abadM9_1999 ;;Abadi, Secrecy by typing in security protocols
|
QuoteRef: abadM_1996 ;;Abadi, Cardelli, A theory of objects
|
QuoteRef: abboRJ3_1990 ;;Abbott, Resourceful systems for fault tolerance, reliability, and safety
|
QuoteRef: abboRJ8_1987 ;;Abbott, Knowledge abstraction
|
QuoteRef: abdaM12_1998 ;;Abdallah, Guerraoui, Pucheral, One-phase commit: Does it make sense
|
QuoteRef: abdeKA1_1994 ;;Abdel-Ghaffar, El Abbadi, An optimal strategy for comparing file copies
|
QuoteRef: abduSE9_1998 ;;Abdullahi, Ringwood, Garbage collecting the internet: a survey of distributed garbage collection
|
QuoteRef: abelNE_1969 ;;Abel, Budnik, Kuck, Muraoka, Northcote, Wilhelmon, Tranquil: A language for an array processing computer
|
QuoteRef: abraD11_1996 ;;Abramson, Foster, Michalakes, Sosic, Relative debugging: A new methodology for debugging scientific applications
|
QuoteRef: abraH12_1977 ;;Abramson, Ordered types and a generalized ??for?? statement
|
QuoteRef: abraP12_1986 ;;Abrahams, The role of failure in software design
|
QuoteRef: abraPW2_1976 ;;Abrahams, On realism in programming examples
|
QuoteRef: acceM6_1986 ;;Accetta, Baron, Bolosky, Golub, Rashid, Tevanian, Young, Mach: a new kernel foundation for UNIX
|
QuoteRef: accoJ3_1997 ;;Accot, Zhai, Beyond Fitts' law: Models for trajectory-based HCI tasks
|
QuoteRef: accoJ5_1999 ;;Accot, Zhai, Performance evaluation of input devices in trajectory-based tasks: an application of the steering law
|
QuoteRef: acheF9_2000 ;;Achermann, Nierstrasz, Explicit namespaces
|
QuoteRef: achuJO6_1981 ;;Achugbue, On the line breaking problem in text formatting
|
QuoteRef: ackeD_1979 ;;Ackerman, De re propositional attitudes toward integers
|
QuoteRef: ackeMS6_1996 ;;Ackerman, Starr, Social activity indicators for groupware
|
QuoteRef: ackeMS_1990 ;;Ackerman, Malone, Answer Garden: a tool for growing organizational memory
|
QuoteRef: ackeWB_1979 ;;Ackerman, Data flow languages
|
QuoteRef: ackoRL_1975 ;;Ackoff, Ernshoff, Advertising research at Anheuser-Busch, Inc. (1963-68)
|
QuoteRef: adamEN1_1973 ;;Adams, The concept of time in programming languages
|
QuoteRef: adamKA7_1983 ;;Adams, Halasz, 25 ways to improve software user manuals
|
QuoteRef: addyAM4_1980 ;;Addyman, A draft proposal for Pascal
|
QuoteRef: adjiW12_1999 ;;Adjie-Winoto, Schwartz, Balakrishnan, Lilley, The design and implementation of an intentional naming system
|
QuoteRef: adriFA11_1993 ;;Adrian, A modest proposal concerning variables and assignment statements
|
QuoteRef: adveSV12_1996 ;;Adve, Gharachorloo, Shared memory models: a tutorial
|
QuoteRef: afekY1_1993 ;;Afek, Brown, Merritt, Lazy caching
|
QuoteRef: agesO11_1999 ;;Agesen, Detlefs, Garthwaite, Knippel, Ramakrishna, White, An efficient meta-lock for implementing ubiquitous synchronization
|
QuoteRef: agesO2_1999 ;;Agesen, Space and time-efficient hashing of garbage-collected objects
|
QuoteRef: agesO6_1998 ;;Agesen, Detlefs, Moss, Garbage collection and local variable type-precision and liveness in Java Virtual Machines
|
QuoteRef: aggaA6_2001 ;;Aggarwal, Randall, Related field analysis
|
QuoteRef: aggaCC1_2001 ;;Aggarwal, Hinneburg, Keim, On the surprising behavior of distance metrics in high dimensional space
|
QuoteRef: agresWW1_1979 ;;Agresti, Register Assignment in Tree-structured programs
|
QuoteRef: ahlbC4_1994 ;;Ahlberg, Shneiderman, The Alphaslider: A compact and rapid selector
|
QuoteRef: ahmeR12_1991 ;;Ahmed, De Smedt, Du, Kent, Ketabchi, Litwin, Raffii, Shan, The Pegasus heterogeneous multidatabase system
|
QuoteRef: ahoAV1_1977 ;;Aho, Johnson, Ullman, Code generation for expressions with common subexpressions
|
QuoteRef: ahoAV4_1979 ;;Aho, Kernighan, Weinberger, Awk-- A pattern scanning and processing language
|
QuoteRef: ahoAV7_1976 ;;Aho, Johnson, Optimal code generation for expression trees
|
QuoteRef: ahoAV_1973 ;;Aho, Ullman, The Theory of Parsing, Translation, and Compiling. Vol II: Compiling
|
QuoteRef: ahoAV_1986 ;;Aho, Sethi, Ullman, Compilers, principles, techniques, and tools
|
QuoteRef: aikeA6_2003 ;;Aiken, Foster, Kodumal, Terauchi, Checking and inferring local non-aliasing
|
QuoteRef: aitkH1_1989 ;;Ait-Kaci, Boyer, Lincoln, Nasr, Efficient implementation of lattice operations
|
QuoteRef: akscRM11_1993 ;;Akscyn, McCracken, Design of hypermedia script languages: The KMS experience
|
QuoteRef: akscRM5_1984 ;;Akscyn, McCracken, The ZOG approach to database management
|
QuoteRef: akscRM7_1988 ;;Akscyn, McCracken, Yoder, KMS: A distributed hypermedia system for managing knowledge in organizations
|
QuoteRef: akscRM7_1988a ;;Akscyn, McCracken, Yoder, KMS: A distributed hypermedia system for managing knowledge in organizations
|
QuoteRef: akscRM9_1984 ;;Akscyn, McCracken, ZOG and the USS CARL VINSON: Lessons in system development
|
QuoteRef: albrAJ11_1983 ;;Albrecht, Gaffney, Software function, source lines of code, and development effort prediction: A software science validation
|
QuoteRef: aldeW_1958 ;;Alderson, The analytical framework for marketing
|
QuoteRef: alexC9_1999 ;;Alexander, The origins of pattern theory
|
QuoteRef: alexC_1975 ;;Alexander, Silverstein, Angel, Ishikawa, Abrams, The Oregon Experiment
|
QuoteRef: alexWG2_1972 ;;Alexander, How a programming language is used
|
QuoteRef: alfoM_1980 ;;Alford, Software requirements in the 80's: from alchemy to science
|
QuoteRef: alkhMM_825 ;;Al-Khowarizmi, Algoritmi de numero Indorum ("Al-Khwarizmi Concerning the Hindu Art of Reckoning"). The Book of Algebra and Almucabola.
|
QuoteRef: alleE10_2003 ;;Allen, Bannet, Cartwright, A first-class approach to genericity
|
QuoteRef: alleFE_1982 ;;Allen, A technological review of the FORTRAN I compiler
|
QuoteRef: alleJF11_1983 ;;Allen, Maintaining knowledge about temporal intervals
|
QuoteRef: allmE7_1983 ;;Allman, SENDMAIL -- An internetwork mail router
|
QuoteRef: alpeB10_2001 ;;Alpern, Cocchi, Fink, Grove, Efficient implementation of java interfaces: Invokeinterface considered harmless
|
QuoteRef: alurR12_1993 ;;Alur, Taubenfeld, How to share an object: a fast timing-based solution
|
QuoteRef: ambrW3_1994 ;;Ambrosch, Ertl, Beer, Krall, Dependence-conscious global register allocation
|
QuoteRef: amirA1_1994 ;;Amir, Benson, Farach, Let sleeping files lie: pattern matching in Z-compressed files
|
QuoteRef: ammeW6_2001 ;;Amme, Dalton, von Ronne, Franz, SafeTSA: A type safe and referentially secure mobile-code representation based on static single assignment form
|
QuoteRef: ammoG1_2002 ;;Ammons, Bodik, Larus, Mining specifications
|
QuoteRef: amzaC2_1996 ;;Amza, Cox, Dwarkadas, Keleher, Lu, Rajamony, Yu, Zwaenepoel, TreadMarks: shared memory computing on networks of workstations
|
QuoteRef: ancoM6_1998 ;;Ancona, Cazzola, Static header as sentinel
|
QuoteRef: andeJH8_1995 ;;Anderson, Ramamurthy, Using lock-free objects in hard real-time applications
|
QuoteRef: andeRJ11_1994 ;;Anderson, Why cryptosystems fail
|
QuoteRef: andeRJ5_1996 ;;Anderson, Bezuidenhoudt, On the reliability of electronic payment systems
|
QuoteRef: andeT_1985 ;;Anderson, Witty, Safe programming
|
QuoteRef: aoeJI9_1992 ;;Aoe, Morimoto, Sato, An efficient implementation of trie structures
|
QuoteRef: appeAW5_1988 ;;Appel, Jacobson, The world's fastest scrabble program
|
QuoteRef: appeAW6_1987 ;;Appel, Garbage collection can be faster than stack allocation
|
QuoteRef: appeAW7_1988 ;;Appel, Ellis, Li, Real-time concurrent collection on stock multiprocessors
|
QuoteRef: appl_1988 ;;Apple Computer, Apple Numerics Manual
|
QuoteRef: apple_1987 ;;Apple Computer, Human Interface Guidelines: The Apple desktop interface
|
QuoteRef: arbiMA_1987 ;;Arbib, Iberall, Lyons, Schemas that integrate vision and touch for hand control
|
QuoteRef: arch_212 ;;Archimedes On floating bodies, Book one
|
QuoteRef: arch_287 ;;Archimedes The sand-reckoner
|
QuoteRef: ardeBW_1980 ;;What can be Automated?
|
QuoteRef: aris_322 ;;Aristotle The Politics of Aristotle
|
QuoteRef: aris_322a ;;Aristotle (384-322 B.C.) Metaphysics
|
QuoteRef: aris_322b ;;Aristotle (384-322 B.C.) De Anima (On the Soul)
|
QuoteRef: armoP11_2002 ;;Armour, Ten unmyths of project estimation
|
QuoteRef: aronM8_2000 ;;Aron, Druschel, Soft timers: efficient microsecond software timer support of network processing
|
QuoteRef: arsaJJ1_1979 ;;Arsac, Syntactic source to source transforms and program manipulation
|
QuoteRef: ashbWR_1956 ;;Ashby, Design for an intelligence-amplifier
|
QuoteRef: ashmH9_2000 ;;Ashman, Electronic document addressing: dealing with change
|
QuoteRef: askwS4_1985 ;;Askwall, Computer supported reading vs. reading text on paper: a comparison of two reading situations
|
QuoteRef: atkiDL7_2002 ;;Atkins, Ball, Graves, Mockus, Using version control data to evaluate the impact of software tools: A case study of the version editor
|
QuoteRef: atkiLV9_1979 ;;Atkinson, Should if...then...else... follow the dodo?
|
QuoteRef: atkiMP6_1987 ;;Atkinson, Buneman, Types and persistence in database programming languages
|
QuoteRef: atkiR_1977 ;;Atkinson, Hewitt, Synchronization in actor systems
|
QuoteRef: atleJM1_1993 ;;Atlee, Gannon, State-based model checking of event-driven system requirements
|
QuoteRef: austRD10_1999 ;;Austin, The phantom menace
|
QuoteRef: austTM6_1994 ;;Austin, Breach, Sohi, Efficient detection of all pointer and array access errors
|
QuoteRef: axfoTH3_1979 ;;Axford, Burkhardt, Dodd, Laflin, Parkyn, Ramsey, ATOL: A simple language with powerful data structuring facilities
|
QuoteRef: aycoJ6_2003 ;;Aycock, A brief history of just-in-time
|
QuoteRef: ayerA6_1998 ;;Ayers, de Jong, Peyton, Schooler, Scalable cross-module optimization
|
QuoteRef: ayerAJ_1956 ;; Ayer, Language, Truth and Logic
|
QuoteRef: azatH10_2003 ;;Azatchi, Levanoni, Paz, Petrank, An on-the-fly mark and sweep garbage collector based on sliding views
|
QuoteRef: babbC_1826 ;;Babbage, On a method of expressing by signs the action of machinery
|
QuoteRef: babbC_1864 ;;Babbage, Of the analytical engine (Chapter VIII)
|
QuoteRef: babeRL6_1985 ;;Baber, I/O statements in higher programming languages: unnecessary and undesirable
|
QuoteRef: bachCW11_1973 ;;Bachman, The programmer as navigator
|
QuoteRef: bachCW_1964 ;;Bachman, Williams, A general purpose programming system for random access memories
|
QuoteRef: bachR1_1997 ;;Bachrach, El-Yaniv, Online list accessing algorithms and their applications: Recent empirical evidence
|
QuoteRef: backJ8_1978 ;;Backus, The history of Fortran I, II, and III
|
QuoteRef: backJ8_1978a ;;Backus, Can programming be liberated from the von Neumann style? A functional style and its algebra of programs
|
QuoteRef: backJW_1957 ;;Backus, Beeber, Best, Goldberg, Haibt, Herrick, Nelson Sayre, Sheridan, Stern, Ziller, Hughes, Nutt, The FORTRAN automatic coding system
|
QuoteRef: backJ_1972 ;;Backus, Reduction languages and variable-free programming
|
QuoteRef: backJ_1973 ;;Backus, Programming language semantics and closed applicative languages
|
QuoteRef: backJ_1980 ;;Backus, Programming in America in the nineteen fifties -- some personal impressions
|
QuoteRef: backRJ11_1979 ;;Back, Exception handling with multi-exit statements
|
QuoteRef: bacoDF10_2000 ;;Bacon, Strom, Tarafdar, Guava: a dialect of Java without data races
|
QuoteRef: bacoDF1_2003 ;;Bacon, Cheng, Rajan, A real-time garbage collector with low overhead and consistent utilization
|
QuoteRef: bacoDF6_2001 ;;Bacon, Attanasio, Lee, Rajan, Smith, Java without the coffee breaks: a noninstrusive multiprocessor garbage collector
|
QuoteRef: bacoF_1600 ;;Bacon, Essay on Dispatch
|
QuoteRef: baecR4_1991 ;;Baecker, Small, Mander, Bringing icons to life
|
QuoteRef: baerJL5_1989 ;;Baer, Lin, Improving quicksort performance with a codeword data structure
|
QuoteRef: baezRA11_1996 ;;Baeza-Yates, Gonnet, Fast text searching for regular expressions or automaton searching on tries
|
QuoteRef: baezRA8_1989 ;;Baeza-Yates, String searching algorithms revisited
|
QuoteRef: baglPR_1969 ;;Bagley, Extension of programming language concepts
|
QuoteRef: bahlD8_2002 ;;Bahle, Williams, Zobel, Efficient phrase querying with an auxiliary index
|
QuoteRef: bahnH6_2002 ;;Bahn, Koh, Noh, Min, Efficient replacement of nonuniform objects in web caches
|
QuoteRef: bahrHP3_1975 ;;Bahrick, Bahrick, Wittlinger, Fifty years of memory for names and faces: A cross-sectional approach
|
QuoteRef: bailGV8_1977 ;;Bailey, Hennessy, Wylie, Functional requirements and other design features of a manned system research facility
|
QuoteRef: bakeFT12_1973 ;;Baker, Mills, Chief programmer teams
|
QuoteRef: bakeFT_1972 ;;Baker, System quality through structured programming
|
QuoteRef: bakeJD6_1966 ;;Baker, Goldstein, Batch vs. sequential displays: Effects on human problem solving
|
QuoteRef: baldG8_1987 ;;Baldwin, Implementation of physical units
|
QuoteRef: balkB10_2000 ;;Balkenhol, Kurtz, Universal data compression based on the Burrows-Wheeler transformation: theory and practice
|
QuoteRef: ballT1_2003 ;;Ball, Naik, Rajamani, From symptom to cause: localizing errors in counterexample traces
|
QuoteRef: ballT6_1993 ;;Ball, Larus, Branch prediction for free
|
QuoteRef: ballT7_2000 ;;Ball, Larus, Using paths to measure, explain, and enhance program behavior
|
QuoteRef: balzRM3_1974 ;;Balzer, Language-independent programmer's interface
|
QuoteRef: balzRM3_1978 ;;Balzer, Goldman, Wile, Informality in program specifications
|
QuoteRef: balzRM8_1968 ;;Balzer, Shirey, The on-line firing squad simulator
|
QuoteRef: balzRM_1986 ;;Balzer, Living in the next-generation operating system
|
QuoteRef: bankRD11_1993 ;;Banker, Datar, Kemerer, Zweig, Software complexity and maintenance costs
|
QuoteRef: bansJP4_1993 ;;Bansler, Bodker, A reappraisal of structured analysis: design in an organizational context
|
QuoteRef: baraAM3_1978 ;;Barak, Aharoni, A study of machine-level software profile
|
QuoteRef: baraK10_2003 ;;Barabash, Ossia, Petrank, Mostly concurrent garbage collection revisited
|
QuoteRef: barbME7_1983 ;;Barber, PARSLEY: A new compiler-compiler
|
QuoteRef: bardGJ12_2001 ;;Badros, Borning, Stuckey, The Cassowary linear arithmetic constraint solving algorithm
|
QuoteRef: barnDT3_1978 ;;Barnard, Elliott, Thompson, Euclid and Modula
|
QuoteRef: baroAJ3_1982 ;;Baroody, DeWitt, The impact of run-time schema interpretation in a network data model DBMS
|
QuoteRef: barrD7_1995 ;;Barreau, Nardi, Finding and reminding, file organization from the desktop
|
QuoteRef: barrJD_1986 ;;Barrow, Tipler, The Anthropic Cosmological Principle
|
QuoteRef: bartCW7_1974 ;;Barth, Notes on the case statement
|
QuoteRef: basiVR12_1987 ;;Basili, Selby, Comparing the effectiveness of software testing strategies
|
QuoteRef: basiVR5_1982 ;;Basili, Mills, Understanding and documenting programs
|
QuoteRef: basiVR9_1975 ;;Basili, Turner, Iterative enhancement: A practical technique for software development
|
QuoteRef: bassL3_1997 ;;Bass, Kasabach, Martin, Siewiorek, Smailagic, Stivoric, The design of a wearable computer
|
QuoteRef: bassPG7_1987 ;;Bassett, Frame-based software engineering
|
QuoteRef: bateD_1974 ;;Commercial Language Systems: International Computer State of the Art Report
|
QuoteRef: bateD_1976 ;;Structured Programming: International State of the Art Report
|
QuoteRef: bateF_1970 ;;Bates, Programming Language / One
|
QuoteRef: bateG_1972 ;;Bateson, Steps to an ecology of mind
|
QuoteRef: bateG_1979 ;;Bateson, Mind and Nature: A necessary unity
|
QuoteRef: baueFL7_1972 ;;Bauer, Wossner, The 'plankalkul' of Konrad Zuse: a forerunner of today's programming languages
|
QuoteRef: baueFL_1976 ;;Bauer, Programming as an evolutionary process
|
QuoteRef: baxtCJ_1975 ;;Baxter, Barton, A language for structured programming
|
QuoteRef: bayeR_1972 ;;Bayer, Mccreight, Organization and maintenance of large ordered indexes
|
QuoteRef: bayeR_2002 ;;Bayer, B-trees and databases, past and future
|
QuoteRef: baymP9_1983 ;;Bayman, Mayer, A diagnosis of beginning programmers' misconceptions of BASIC programming statements
|
QuoteRef: bealNC_1981 ;;Beale, Peyton, Jones, An ADA compatible specification language
|
QuoteRef: beatJC1_1974 ;;Beatty, Register assignment algorithm for generation of highly optimized object code
|
QuoteRef: beck5_1990 ;;Beckmann, Kriegel, Schneider, Seeger, The R*-tree: An efficient and robust access method for points and rectangles
|
QuoteRef: beckE_1973 ;;Becker, The Denial of death
|
QuoteRef: beckJD7_1987 ;;Becker, Arabic word processing
|
QuoteRef: beckLL10_1982 ;;Beck, A dynamic storage allocation technique based on memory residence time
|
QuoteRef: beckR7_1990 ;;Beckwith, Miller, Implementing a lexical network
|
QuoteRef: beemWO11_1987 ;;Beeman, Anderson, Bader, Larkin, McClard, McQuillan, Shields, Hypertext and pluralism: From lineal to non-lineal thinking
|
QuoteRef: beet5_1989 ;;Beetem, Beetem, Introduction to the Galaxy language
|
QuoteRef: begeML10_1988 ;;Begeman, Conklin, The right tool for the job
|
QuoteRef: beizB3_1997 ;;Beizer, Cleanroom process model: a critical examination
|
QuoteRef: beizB_1984 ;;Beizer, Software System Testing and Quality Assurance
|
QuoteRef: bekeGA4_1986 ;;Bekey, Tomovic, Robot control by reflex actions
|
QuoteRef: bekiH_1971 ;;Bekii, An introduction to Algol 68
|
QuoteRef: belaLA10_1980 ;;Belady, Modifiability of large software systems
|
QuoteRef: belaLA3_1976 ;;Belady, Lehman, A model of large program development
|
QuoteRef: belaLA_1979 ;;Belady, Lehman, The characteristics of large systems
|
QuoteRef: belfPC_1976 ;;Belford, Taylor, Specification verification--A key to improving software reliability
|
QuoteRef: bellCG_1971 ;;Bell, Newell, Computer Structures: readings and examples
|
QuoteRef: bellF6_1991 ;;Bell, Grosspietsch, Specification of fault-tolerant system issues by predicate/transition nets and regular expressions--approach and case study
|
QuoteRef: bellJ4_1993 ;;Bell, Gupta, An evaluation of self-adjusting binary search tree techniques
|
QuoteRef: bellJR6_1973 ;;Bell, Threaded code
|
QuoteRef: bellSM10_1990 ;;Bellovin, Merritt, Limitations of the Kerberos Authentication System
|
QuoteRef: bellT12_1989 ;;Bell, Witten, Cleary, Modeling for text compression
|
QuoteRef: bellT7_1993 ;;Bell, Kulp, Longest-match string searching for Ziv-Lempel compression
|
QuoteRef: benaP_1965 ;;Benacerraf, What numbers could not be
|
QuoteRef: benaP_1983 ;;Introduction
|
QuoteRef: benbI4_1984 ;;Benbasat, Wand, Command abbreviation behavior in human-computer interaction
|
QuoteRef: bennRK6_1968 ;;Bennett, Build... A base for uniform language definition: A user's manual for computer language designers and systems programmers
|
QuoteRef: bennRK7_1976 ;;Bennett, Build: a primitive approach to the design of computer languages and their translators
|
QuoteRef: bensBW2_1999 ;;Benson, Inner classes. Closures for the masses
|
QuoteRef: bensJP_1973 ;;Benson, Structured programming techniques
|
QuoteRef: bentJ10_1983 ;;Bentley, Programming Pearls: Writing correct programs
|
QuoteRef: bentJ11_1998 ;;Bentley, Sedgewick, Sorting strings with three-way radix quicksort
|
QuoteRef: bentJ2_1986 ;;Bentley, Programming pearls: Cutting the Gordian knot
|
QuoteRef: bentJ3_1984 ;;Bentley, Programming pearls: The back of the envelope
|
QuoteRef: bentJ4_1998 ;;Bentley, Sedgewick, Ternary search trees
|
QuoteRef: bentJ5_1985 ;;Bentley, Programming pearls: A spelling checker
|
QuoteRef: bentJ9_1987 ;;Bentley, Programming pearls. A sample of brilliance
|
QuoteRef: bentJL11_1993 ;;Bentley, McIlroy, Engineering a sort function
|
QuoteRef: bentJL1_1997 ;;Bentley, Sedgewick, Fast algorithms for sorting and searching strings
|
QuoteRef: bentJL_1982 ;;Bentley, Writing efficient Programs
|
QuoteRef: bentLA8_1978 ;;Benton, Interactive compiler translates step-by-step and stores translation
|
QuoteRef: benvA9_1991 ;;Benveniste, Berry, The synchronous approach to reactive and real-time systems
|
QuoteRef: bereG9_1982 ;;Beretta, Burkhart, Fink, Nievergelt, Ventura, Weydert, XS-1: An integrated interactive system and its kernel
|
QuoteRef: bergD12_1985 ;;Bergmark, GIBBSGEN: Code generation for GIBBS
|
QuoteRef: bergED11_2000 ;;Berger, McKinley, Blumofe, Wilson, Hoard: A scalable memory allocator for multithreaded applications
|
QuoteRef: bergED11_2002 ;;Berger, Zorn, McKinley, Reconsidering custom memory allocation
|
QuoteRef: bergGD10_1981 ;;Bergland, A guided tour of program design methodologies
|
QuoteRef: bergT9_1997 ;;Bergin, HOPL II - Closing panel: The history of programming: Does our present past have a future?
|
QuoteRef: berkS11_2000 ;;Berkovich, Lapir, Mack, A bit-counting algorithm using the frequency division principle
|
QuoteRef: berlB2_1973 ;;Berlin, Breedlove, Raven, General principles of classification and nomenclature in folk biology
|
QuoteRef: bernCL4_1948 ;;Bernier, Crane, Indexing abstracts
|
QuoteRef: bernM6_2003 ;;Berndl, Lhotak, Qian, Hendren , Umaneee, Pointers-to analysis using BDDs
|
QuoteRef: bernN3_1977 ;;Bernstein, Knobe, A non-general-purpose operating system
|
QuoteRef: bernN_1935 ;;Bernstein, The problem of the interrelation of co-ordination and localization
|
QuoteRef: bernN_1940 ;;Bernstein, et al Biodynamics of locomotion
|
QuoteRef: bernN_1957 ;;Bernstein, Some emergent problems of the regulation of motor acts
|
QuoteRef: bernN_1962 ;;Bernstein, Trends in physiology and their relation to cybernetics
|
QuoteRef: bernN_1967 ;;Bernstein, The Co-ordination and regulation of movement
|
QuoteRef: bernPA5_1978 ;;Bernstein, Rothnie, Goodman, Papadimitriou, The concurrency control mechanism of SDD-1: A system for distributed databases (the fully redundant case)
|
QuoteRef: bernT8_1994 ;;Berners-Lee, Cailliau, Luotonen, Nielsen, Secret, The world-wide web
|
QuoteRef: berrDM4_1977 ;;Berry, Erlich, Lucena, Pointers and data abstractions in high level languages. I. Language proposals
|
QuoteRef: bersBN12_1995 ;;Bershad, Savage, Pardyak, Sirer, Fiuczynski, Becker, Chambers, Eggers, Extensibility, safety and performance in the SPIN operating system
|
QuoteRef: bertE4_1999 ;;Bertino, Jajodia, Samarati, A flexible authorization mechanism for relational data management systems
|
QuoteRef: berzAT_1980 ;;Berztiss, Data abstraction, controlled iteration, and communicating processes
|
QuoteRef: beszA9_2003 ;;Beszedes, Ferenc, Gyimothy, Dolenc, Karsisto, Survey of code-size reduction methods
|
QuoteRef: bhamA2_1998 ;;Bhamidipaty, Proebsting, Very fast YACC-compatible parsers (for very little effort)
|
QuoteRef: bhatS4_1997 ;;Bhattacharjee, Ammar, Zegura, Shah, Fei, Application-layer anycasting
|
QuoteRef: bianMH_1976 ;;Bianchi, Wood, A user's viewpoint of the programmer's workbench
|
QuoteRef: biasR9_1991 ;;Bias, Walkthroughs: Efficient collaborative testing
|
QuoteRef: bierKH1_1988 ;;Bierman, A proposal for improving optimizer quality via dynamic analysis
|
QuoteRef: bigeJ11_1987 ;;Bigelow, Riley, Manipulating source code in DynamicDesign
|
QuoteRef: bigeJ3_1988 ;;Bigelow, Hypertext and CASE
|
QuoteRef: biloW5_1974 ;;Bilofsky, Syntax extension and the IMP72 programming language
|
QuoteRef: birdR2_1995 ;;Bird, Gopal, Herzberg, Janson, Kutten, Molva, Yung, The KryptoKnight family of light-weight protocols for authentication and key distribution
|
QuoteRef: birmKP2_1987 ;;Birman, Joseph, Reliable communication in the presence of failures
|
QuoteRef: birrAD4_1982 ;;Birrell, Levin, Needham, Schroeder, Grapevine: An exercise in distributed computing
|
QuoteRef: birrAD9_1980 ;;Birrell, Needham, A universal file server
|
QuoteRef: birrAD_1991 ;;Birrell, An introduction to programming with threads
|
QuoteRef: birrAD_1991a ;;Birrell, Guttag, Horning, Levin, Thread synchronization: a formal specification
|
QuoteRef: bishM10_1986 ;;Bishop, How to use USENET effectively
|
QuoteRef: blacR3_1983 ;;Blackwell, Console helps programmers code software
|
QuoteRef: blacSM10_2003 ;;Blackburn, McKinley, Ulterior reference counting: fast garbage collection without a long wait
|
QuoteRef: blaiDC1_1996 ;;Blair, STAIRS redux: Thoughts on the STAIRS evaluation, ten years later
|
QuoteRef: blaiDC3_1985 ;;Blair, Maron, An evaluation of retrieval effectiveness for a full-text document-retrieval system
|
QuoteRef: blaiDC6_1992 ;;Blair, Information retrieval and the philosophy of language
|
QuoteRef: blaiDC_1990 ;;Blair, Language and representation in information retrieval
|
QuoteRef: blakBA3_1996 ;;Blake, Jalics, An assessment of object-oriented methods and C++
|
QuoteRef: blazM2_1996 ;;Blaze, High-bandwidth encryption with low-bandwidth smartcards
|
QuoteRef: blazM6_1994 ;;Blaze, Key management in an encrypting file system
|
QuoteRef: blazM_1999 ;;Blaze, Feigenbaum, Ioannidis, Keromytis, The role of trust management in distributed systems security
|
QuoteRef: blelGE3_1996 ;;Blelloch, Programming parallel algorithms
|
QuoteRef: blisCK_1965 ;;Bliss, Semantography (Blissymbolics)
|
QuoteRef: blooBH7_1970 ;;Bloom, Space/Time trade-offs in hash coding with allowable errors
|
QuoteRef: blumBI8_1985 ;;Blum, On how we get invalid systems
|
QuoteRef: blumBI_1985 ;;Blum, Language, problem solving and system development
|
QuoteRef: bobrD1_1977 ;;Bobrow, Winograd, An overview of KRL, a knowledge representation language
|
QuoteRef: bobrDG7_1980 ;;Bobrow, Managing reentrant structures using reference counts
|
QuoteRef: bobrDG9_1974 ;;Bobrow, Raphael, New programming languages for artificial intellegence research
|
QuoteRef: bobrDG9_1986 ;;Bobrow, Mittal, Stefik, Expert systems: perils and promise
|
QuoteRef: bochGV7_1973 ;;Bochmann, Multiple exits from a loop without the goto
|
QuoteRef: bockDB7_1992 ;;Bock, Klepper, FP-S: A simplified function point counting method
|
QuoteRef: bodiR6_2000 ;;Bodik, Gupta, Sarkar, ABCD: Eliminating array bounds checks on demand
|
QuoteRef: boehBW12_1976 ;;Boehm, Software engineering
|
QuoteRef: boehBW5_1973 ;;Boehm, Software and its impact: a quantitative assessment
|
QuoteRef: boehBW5_1984 ;;Boehm, Gray, Seewaldt, Prototyping versus specifying: A multiproject experiment
|
QuoteRef: boehBW_1976 ;;Boehm, Brown, Lipow, Quantitative evaluation of software quality
|
QuoteRef: boehBW_1978 ;;Boehm, Brown, Kaspar, MacLeod, Merritt, Characteristics of Software Quality
|
QuoteRef: boehBW_1979 ;;Boehm, Software engineering--as it is
|
QuoteRef: boehHJ12_1995 ;;Boehm, Atkinson, Plass, Ropes: an alternative to strings
|
QuoteRef: bohmC5_1966 ;;Bohm, Jacopini, Flow diagrams, turing machines, and languages with only two formation rules
|
QuoteRef: bohmC9_2001 ;;Bohm, Berchtold, Keim, Searching in high-dimensional spaces--Index structures for improving the performance of multimedia databases
|
QuoteRef: boieSJ6_1974 ;;Boies, Gould, Syntactic errors in computer programming
|
QuoteRef: boltJD11_1987 ;;Bolter, Joyce, Hypertext and creative writing
|
QuoteRef: boltRA7_1980 ;;Bolt, "Put-that-there": Voice and gesture at the graphics interface
|
QuoteRef: boltRA_1979 ;;Bolt, Spatial Data-Management
|
QuoteRef: boltRA_1984 ;;Bolt, The Human Interface
|
QuoteRef: bonaR_1981 ;;Bonami, Cotton, Denenberg, ITT 1240 Digital Exchange, Architecture
|
QuoteRef: bongM_1967 ;;Bongard, Problema Uznavaniya
|
QuoteRef: boocG1_1982 ;;Booch, Naming subprograms with clarity
|
QuoteRef: boocG_1999 ;;Booch, Rumbaugh, Jacobson, The Unified Modeling Language User Guide
|
QuoteRef: boolG_1854 ;;Boole, An investigation of the laws of thought
|
QuoteRef: boomHJ9_1976 ;;Boom, Extended type checking
|
QuoteRef: bootB6_2000 ;;Boothe, Efficient algorithms for bidirectional debugging
|
QuoteRef: bootKS11_1981 ;;Booth, Authentication of signatures using public key encryption
|
QuoteRef: boreN2_1988 ;;Borenstein, Everhart, Rosenberg, Stoller, A multi-media message system for Andrew
|
QuoteRef: boreNS11_1992 ;;Borenstein, Computational mail as network infrastructure for computer- supported cooperative work
|
QuoteRef: boreNS9_1988 ;;Borenstein, Thyberg, Cooperative work in the Andrew Message System
|
QuoteRef: boreNS_1991 ;;Borenstein, Programming as if people mattered: friendly programs, software engineering, and other noble delusions
|
QuoteRef: borgA10_1986 ;;Borgida, Exceptions in object-oriented languages
|
QuoteRef: borgA1_1985 ;;Borgida, Features of languages for the development of information systems at the conceptual level
|
QuoteRef: bornA10_1997 ;;Borning, Marriott, Stuckey, Xiao, Solving linear arithmetic constraints for user interface applications
|
QuoteRef: bornA11_1997 ;;Borning, Lin, Marriott, Constraints for the web
|
QuoteRef: bornA2_1987 ;;Borning, Computer system reliability and nuclear war
|
QuoteRef: bornAH11_1986 ;;Borning, Classes versus prototypes in object-oriented languages
|
QuoteRef: boroR11_1998 ;;Borovoy, Martin, Vemuri, Resnick, Silverman, Hancock, Meme tags and community mirrors: moving from conferences to collaboration
|
QuoteRef: boscR9_1973 ;;Bosch, Grune, Meertens, Aleph, a language encouraging program hierarchy
|
QuoteRef: bossA8_1996 ;;Bosselaers, Govaerts, Vandewalle, Fast hashing on the Pentium
|
QuoteRef: boutRT1_1990 ;;Boute, A heretical view on type embedding
|
QuoteRef: boutRT4_1992 ;;Boute, The Euclidean definition of the functions div and mod
|
QuoteRef: boweJP4_1995 ;;Bowen, Hinchey, Ten commandments of formal methods
|
QuoteRef: boyaC6_2003 ;;Boyapati, Salcianu, Beebee, Rinard, Ownership types for safe region-based memory management in real-time Java
|
QuoteRef: boydRE3_1984 ;;Boydston, Programming cost estimate: Is it reasonable?
|
QuoteRef: boylJ5_2001 ;;Boyland, Alias burying: unique variables without destructive reads
|
QuoteRef: boylJM5_1999 ;;Boyle, Resler, Winter, Do you trust your compiler?
|
QuoteRef: brabC1_2002 ;;Brabrand, Schwartzbach, Growing languages with metamorphic syntax macros
|
QuoteRef: bracRJ10_1983 ;;Brachman, What IS-A is and isn't: an analysis of taxonomic links in semantic networks
|
QuoteRef: bradJT5_1986 ;;Brady, A theory of productivity in the creative process
|
QuoteRef: branP11_1971 ;;Branquart, Lewi, Sintzoff, Wodon, The composition of semantics in Algol 68
|
QuoteRef: branR9_1981 ;;Brandshaft, Letter to the editor
|
QuoteRef: branS_1974 ;;Brand, Both sides of the necessary paradox (conversations with Gregory Bateson)
|
QuoteRef: brenRP7_1989 ;;Brent, Efficient implementation of the first-fit strategy for dynamic storage allocation
|
QuoteRef: briaD_1996 ;;Brian, Einstein: a life
|
QuoteRef: briaM10_1999 ;;Briand, Editor's Forum
|
QuoteRef: briaM1_2001 ;;Briand, The Woods of Complexity [Editor's Forum]
|
QuoteRef: bricEF11_1991 ;;Brickell, McCurley, Interactive identification and digital signatures
|
QuoteRef: brinP11_1978 ;;Brinch-Hansen, Distributed processes: a concurrent programming concept
|
QuoteRef: brinP12_1973 ;;Brinch-Hansen, Concurrent programming
|
QuoteRef: brinP4_1969 ;;Brinch Hansen, RC 4000 software: multiprogramming system, Part 1 General description
|
QuoteRef: brinP4_1970 ;;Brinch Hansen, The nucleus of a multiprogramming system
|
QuoteRef: brinP4_1999 ;;Brinch Hansen, Java's insecure parallelism
|
QuoteRef: brinP7_1972 ;;Brinch Hansen, Structured multiprogramming
|
QuoteRef: brinP9_1978 ;;Brinch-Hansen, Staunstrup, Specification and implementation of mutual exclusion
|
QuoteRef: brinP_1973 ;;Brinch Hansen, Chapter 7, Resource Protection
|
QuoteRef: brinS10_2000 ;;Bringsjord, Caporale, Noel, Animals, zombanimals, and the total Turing test
|
QuoteRef: brinS4_1998 ;;Brin, Page, The anatomy of a large-scale hypertextual web search engine
|
QuoteRef: brodML1_1981 ;;Brodie, Data abstraction for designing database-intensive applications
|
QuoteRef: brooFP3_1996 ;;Brooks, The computer scientist as toolsmith II
|
QuoteRef: brooFP8_1977 ;;Brooks, The computer "scientist" as toolsmith--studies in interactive computer graphics
|
QuoteRef: brooFP_1975 ;;Brooks, The Mythical Man-month: essays on software engineering
|
QuoteRef: brooFP_1986 ;;Brooks, No silver bullet. Essence and accidents of software engineering
|
QuoteRef: brooR3_1993 ;;Brooks, The case for the specialized interface
|
QuoteRef: brooR9_1993 ;;Brooks, reply to Goran Pop-Jordanov's letter, Prototyping for interface-development
|
QuoteRef: brooRA1_1991 ;;Brooks, Intelligence without representation
|
QuoteRef: brooRA6_1990 ;;Brooks, Elephants don't play chess
|
QuoteRef: brooRA_1987 ;;Brooks, A robust programming scheme for a mobile robot
|
QuoteRef: brooTA4_1993 ;;Brooks, All the right descriptors: a test of the strategy of unlimited aliasing
|
QuoteRef: browAW5_1993 ;;Brown, An examination of the current state of IPSE technology
|
QuoteRef: browGM6_1989 ;;Brown, Gouda, Wu, Token systems that self-stabilize
|
QuoteRef: browGS_1972 ;;Brown, Laws of Form
|
QuoteRef: browMH12_1992 ;;Brown, Hershberger, Color and sound in algorithm animation
|
QuoteRef: browMH1_1985 ;;Brown, Sedgewick, Techniques for algorithm animation
|
QuoteRef: browMH5_1988 ;;Brown, Exploring algorithms using Balsa-II
|
QuoteRef: browMR_1991 ;;Brown, Nelson, I/O streams: abstract types, real programs
|
QuoteRef: browPJ10_1967 ;;Brown, The ML1 macro processor
|
QuoteRef: browPJ11_1987 ;;Brown, Turning ideas into products: the Guide system
|
QuoteRef: browPJ_1969 ;;Brown, A survey of macro processors
|
QuoteRef: browPJ_1974 ;;Brown, Macro Processors and Techniques for Portable Software
|
QuoteRef: browPS7_1987 ;;Brown, Gould, An experimental study of people creating spreadsheets
|
QuoteRef: browRE7_1976 ;;Brown, Toward a better language for structured programming
|
QuoteRef: browSA11_1963 ;;Brown, Drayton, Mittman, A description of APT language
|
QuoteRef: brucKB3_1996 ;;Bruce, Progress in programming languages
|
QuoteRef: brueB8_1983 ;;Bruegge, Hibbard, Generalized path expressions: A high level debugging mechanism
|
QuoteRef: brunJ7_1972 ;;Bruno, Steiglitz, The expression of algorithms by charts
|
QuoteRef: bryaGE_1994 ;;Bryan, Not all programmers are created equal
|
QuoteRef: bubeR2_1992 ;;Bubenik, Zwaenepoel, Optimistic Make
|
QuoteRef: buchO5_1976 ;;Buchegger, Fuchs, If 'ELSE' then 'CASE'
|
QuoteRef: buckJD6_1973 ;;Buckley, Gledhil, Mackay, Search--a language for retrieval and statistical analysis of medical records
|
QuoteRef: buddTA_1978 ;;Budd, Lipton, Sayward, DeMillo, The design of a prototype mutation system for program testing
|
QuoteRef: buddTA_1980 ;;Budd, DeMillo, Lipton, Sayward, Theoretical and empirical studies on using program mutation to test the functional correctness of programs
|
QuoteRef: budiZ2_1999 ;;Budimlic, Kennedy, Piper, The cost of being object-oriented: a preliminary study
|
QuoteRef: buffJ9_1999 ;;Buffenbarger, Gruell, A branching/merging strategy for parallel software development
|
QuoteRef: buhrPA9_2000 ;;Buhr, Moke, Advanced exception handling mechanisms
|
QuoteRef: buneP1_1981 ;;Buneman, Winston, The use of data type information in an interactive database environment
|
QuoteRef: buneP5_1986 ;;Buneman, Atkinson, Inheritance and persistence in database programming languages
|
QuoteRef: burgRG5_1996 ;;Burger, Dybvig, Printing floating-point numbers quickly and accurately
|
QuoteRef: burgT_1979 ;;Burge, Individualism and the mental
|
QuoteRef: burgWH1_1975 ;;Burge, Stream processing functions
|
QuoteRef: burgWH_1975 ;;Burge, Recursive Programming Techniques
|
QuoteRef: burrWE8_1983 ;;Burr, An Overview of the proposed american national standard for local distributed data interfaces
|
QuoteRef: burrou_1972 ;;Burroughs B6700/B7700 Extended Algol Language: Information Manual
|
QuoteRef: bursRM8_1977 ;;Burstall, Goguen, Putting specifications together
|
QuoteRef: bushV7_1945 ;;Bush, As we may think
|
QuoteRef: bushV8_1959 ;;Bush, Memex II
|
QuoteRef: butlR12_2000 ;;Butler, Welch, Engert, Foster, Tuecke, Volmer, Kesselman, A national-scale authentication infrastructure
|
QuoteRef: butlRW12_1991 ;;Butler, Finelli, The infeasibility of experimental quantification of life- critical software reliability
|
QuoteRef: butlRW1_1993 ;;Butler, Finelli, The infeasibility of quantifying the reliability of life-critical real-time software
|
QuoteRef: buttRA4_1975 ;;Butterworth, Structured symbols
|
QuoteRef: buxtB_1987 ;;Buxton, The "natural" language of interaction: A perspective on nonverbal dialogues
|
QuoteRef: buxtJN_1962 ;;Buxton, Laske, Control and simulation language (CSL)
|
QuoteRef: buxtW_1986 ;;Buxton, There's more to interaction than meets the eye: Some issues in manual input
|
QuoteRef: buzzRD1_1975 ;;Buzzell, Gale, Sultan, Market Share -- A key to profitability.
|
QuoteRef: byrnMD10_1991 ;;Byrne, The misunderstood picture: A study of icon recognition
|
QuoteRef: byrnMD4_1993 ;;Byrne, Using icons to find documents: Simplicity is critical
|
QuoteRef: byrnMD5_1999 ;;Byrne, John, Wehrle, Crow, The tangled web we wove: A taxonomy of WWW use
|
QuoteRef: byte4_1982
|