Map
Index
Random
Help
Topics
th

ThesaHelp: references i-l

topics > Group: all references



ThesaHelp:
references a-b
ThesaHelp:
references c-d
ThesaHelp:
references e-f
ThesaHelp:
references g-h
ThesaHelp:
references i-l
ThesaHelp:
references m-o
ThesaHelp:
references p-r
ThesaHelp:
references sa-sz
ThesaHelp:
references t-z

Summary

Quotation references starting with 'i', 'j', 'k', or 'l'.
Quotations
QuoteRef: ibm_1982 ;;IBM ad
QuoteRef: ichbJD_1972 ;;Ichbiah, Morse, General concepts of the Simula 67 programming language
QuoteRef: ichbJD_1973 ;;Ichbiah, Rissen, Heliard, The two-level approach to data independence programming in the LIS system implementation language
QuoteRef: ignaS10_1998 ;;Ignatchenko, An algorithm for online data compression
QuoteRef: induB3_1986 ;;Indurkhya, Stone, Xi-Cheng, Optimal partitioning of randomly generated distributed programs
QuoteRef: ingaD10_1997 ;;Ingalls, Kaehler, Maloney, Wallace, Kay, Back to the future. The story of Squeak, a practical Smalltalk written in itself
QuoteRef: ingaDH8_1981 ;;Ingalls, The Smalltalk graphics kernel
QuoteRef: ingaDH8_1981a ;;Ingalls, Design principles behind Smalltalk
QuoteRef: ingaDH9_1982 ;;Ingalls, Why operating systems may disappear
QuoteRef: ingaDH9_1986 ;;Ingalls, A simple technique for handling multiple polymorphism
QuoteRef: ingePZ1_1961 ;;Ingerman, Thunks, a way of compiling procedure statements with some comments on procedure declarations
QuoteRef: inouH_1984 ;;Inoue, Inaba, Hand-eye coordination in rope handling
QuoteRef: instrumentcontrol
QuoteRef: ironET1_1969 ;;Irons, Experience with an extensible language
QuoteRef: ishiK10_2000 ;;Ishizaki, Kawahito, Yasue, Komatsu, Noakatani, A study of devirtualization techniques for a Java just-in-time compiler OOPSLA '00
QuoteRef: ivieEL10_1977 ;;Ivie, The programmer's workbench--a machine for software development
QuoteRef: ivorMY12_2001 ;;Ivory, Hearst, The state of the art in automating usability evaluation of user interfaces
QuoteRef: jackD6_1993 ;;Jackson, Abstract analysis with Aspect
QuoteRef: jackMA2_1984 ;;Jackson, Software composition
QuoteRef: jackMA5_1976 ;;Jackson, Information systems: modeling, sequencing and transformations
QuoteRef: jackMA_1975 ;;Jackson, Principles of Program Design
QuoteRef: jackMA_1977 ;;Jackson, The Jackson design methodology
QuoteRef: jacoRJ4_1990 ;;Jacob, What you look at is what you get: Eye movement-based interaction techniques
QuoteRef: jacoSC4_1986 ;;Jacobsen, Iversen, Knutti, Johnson, Biggers, Design of the UTAH/M.I.T. dextrous hand
QuoteRef: jaesG12_1981 ;;Jaeschke, Reciprocal hashing: A method for generating minimal perfect hashing functions
QuoteRef: jainAK9_1999 ;;Jain, Murty, Flynn, Data clustering: a review
QuoteRef: jainR10_1985 ;;Jain, Chlamtac, The P^2 algorithm for dynamic calculation of quantiles and histograms without storing observations.
QuoteRef: jakiSL_1969 ;;Jaki, Brain, Mind and Computers
QuoteRef: jameJS9_1978 ;;James, FORTH for microcomputers
QuoteRef: jameW_1890 ;;James, The Principles of Psychology
QuoteRef: jansBJ1_1998 ;;Jansen, Spink, Bateman, Sarcevic, Real life information retrieval: a study of user queries on the web
QuoteRef: jansP4_1997 ;;Janson, Tsudik, Yung, Scalability and flexibility in authentication services: the ??KryptoKnight?? approach
QuoteRef: jansP9_1995 ;;Janson, Tsudik, Secure and minimal protocols for authenticated key distribution
QuoteRef: jardDA5_1981 ;;Jardine, Davis, A data-base application design language
QuoteRef: jazeJM7_2001 ;;Jezequel, Deveaux, Le Traon, Reliable objects: lightweight testing for OO languages
QuoteRef: jeffDR5_1993 ;;Jeffery, Low, Barnes, A comparison of function point counting techniques
QuoteRef: jeffDR7_1985 ;;Jefferson, Virtual time
QuoteRef: jenaSK3_1999 ;;Jena, An improved Lempel-Ziv algorithm for sequential data compression
QuoteRef: jenkB9_1997 ;;Jenkins, Hash functions
QuoteRef: jenkRJ2_1996 ;;Jenkins, ISAAC
QuoteRef: jensC4_2000 ;;Jensen, Farnham, Drucker, Kollock, The effect of communication modality on cooperation in online environments
QuoteRef: jimT5_2000 ;;Jim, SD3: a trust management system with certified evaluation
QuoteRef: jiroM12_1993 ;;Jirotk, Luff, Heath, Requirements for technology in complex environments: Tasks and interaction in a city dealing room
QuoteRef: johnJ9_1989 ;;Johnson, Roberts, Verplank, Smith, Irby, Beard, Mackey, The Xerox Star: A retrospective
QuoteRef: johnMS10_1998 ;;Johnstone, Wilson, The memory fragmentation problem: solved?
QuoteRef: johnMS2_1982 ;;Johnson, A software debugging glossary
QuoteRef: johnMS3_1982 ;;Johnson, Some requirements for architectural support of software debugging
QuoteRef: johnRI3_1976 ;;Johnson, Mories, Abstract data types in the Model programming language
QuoteRef: johnRK3_1982 ;;Johnsson, Wick, An overview of the Mesa processor architecture
QuoteRef: johnSC7_1978a ;;Johnson, Ritchie, Portability of C programs and the UNIX system
QuoteRef: johnSC7_1978b ;;Johnson, Lesk, UNIX time-sharing system: Language development tools
QuoteRef: johnS_1747 ;;Johnson, The plan of an English dictionary, submitted to the right honourable Phillip Dormer, Earl of Chesterfield
QuoteRef: johnS_1755 ;;Johnson, A Dictionary of the English Language in which the words are deduced from their origin and illustrated in their different significations by examples from the best writers
QuoteRef: joneAK4_1976 ;;Jones, Liskov, An access control facility for programming languages
QuoteRef: joneAK5_1978 ;;Jones, A language extension for expressing constraints on data access
QuoteRef: joneR_1996 ;;Jones, Lins, Garbage collection: algorithms for automatic dynamic memory management
QuoteRef: joneSL2_1986 ;;Jones, Parsing distfix operators
QuoteRef: joneSP9_2000 ;;Jones, Eber, Seward, Composing contracts: an adventure in financial engineering
QuoteRef: joneTC1_1977 ;;Jones, Program quality and programmer productivity
QuoteRef: joneTC4_1979 ;;Jones, A survey of programming design and specification techniques
QuoteRef: joneTC4_1979a ;;Jones, An overview of programming architectures and design languages
QuoteRef: joneTC4_1979b ;;Jones, An overview of programming architectures and design languages
QuoteRef: joneTC6_1977 ;;Jones, Psychology, Linguistics, and Physics in Northern India and China from the 6th century B.C. to the 9th century A.D.
QuoteRef: joneTC8_1981 ;;Jones, Alternatives to programming
QuoteRef: joneWP1_1986 ;;Jones, Dumais, The spatial metaphor for user interfaces: Experimental tests of reference by location versus name
QuoteRef: joneWP9_1987 ;;Jones, How do we distinguish the hyper from the hype in non-linear- text
QuoteRef: jonesTC12_1981 ;;Jones, Defect removal: A look at the state of the art
QuoteRef: jonsD8_1987 ;;Jonsson, Pancode and boxcharts: Structured programming revisited
QuoteRef: kabbP4_1993 ;;Kabbash, MacKenzie, Buxton, Human performance using computer input devices in the preferred and non-preferred hands
QuoteRef: kaehT9_1986 ;;Kaehler, Virtual memory on a narrow machine for an object-oriented language
QuoteRef: kakaY9_1985 ;;Kakazu, Nakamura, Kamimura, Okino, A study on cooperative robot motion simulation
QuoteRef: kandE3_1998 ;;Kandogan, Shneiderman, Elastic windows: design, implementation, and evaluation of multi-window operations
QuoteRef: kantE7_1986 ;;Kantorowitz, Laor, Automatic generation of useful syntax error messages
QuoteRef: kantI_1781 ;;Kant, Critique of Pure Reason
QuoteRef: kaplSJ7_1990 ;;Kaplan, Kapor, Belove, Landsman, Drake, Agenda: A personal information manager
QuoteRef: kapoAA1_1978 ;;Kaposi, An algebra of algorithms and its application to program design and maintenance
QuoteRef: karaCM12_1998 ;;Karat, Guaranteeing rights for the user
QuoteRef: karaCM5_1999 ;;Karat, Halverson, Horn, Karat, Patterns of entry and correction in large vocabulary continuous speech recognition systems
QuoteRef: karaV6_1999 ;;Karamcheti, Li, Pechtchanski, Yap, A core library for robust numeric and geometric computation
QuoteRef: kareR3_1994 ;;Karedla, Love, Wherry, Caching strategies to improve disk system performance
QuoteRef: kariRR7_1987 ;;Karinthi, Weiser, Incremental re-execution of programs
QuoteRef: karrM5_1978 ;;Karr, Loveman, Incorporation of units into programming languages
QuoteRef: karrM6_1984 ;;Karr, Code generation by coagulation
QuoteRef: karyG8_1999 ;;Karypis, Han, Kumar, Chameleon: hierarchical clustering using dynamic modeling
QuoteRef: kastU_1980 ;;Kastens, Ordered Attributed grammars
QuoteRef: kaszM10_1999 ;;Kaszkiel, Zobel, Sacks-Davis, Efficient passage ranking for document databases
QuoteRef: katzJ12_1971 ;;Katzenelson, Milgram, A short presentation of the main features of AEPL--An extensible programming languages
QuoteRef: katzJ5_1979 ;;Katzenelson, Clusters and dialogues for set implementations
QuoteRef: katzJH_1963 ;;Katz, McGee, An experiment in non-procedural programming
QuoteRef: katzL_1981 ;;Katzschner, Van den Brande, ITT 1240 Digital Exchange, Software concepts and implementation
QuoteRef: katzN1_1972 ;;Katzman, Nyenhuis, Color vs. Blank-and-white effects on learning, opinion, and attention,
QuoteRef: kaufW_1980 ;;Kaufmann, Discovering the mind, Volume two, Nietzsche, Heidegger, and Buber
QuoteRef: kawaK11_2002 ;;Kawachiya, Koseki, Onodera, Lock reservation: Java locks can mostly do without atomic operations
QuoteRef: kawaM11_2000 ;;Kawahito, Komatsu, Nakatani, Effective null pointer check elimination utilizing hardware trap
QuoteRef: kayA3_1977 ;;Kay, Goldberg, Personal dynamic media
QuoteRef: kayA3_1993 ;;Kay, The history of Smalltalk
QuoteRef: kayAC6_1968 ;;Kay, Flex--a flexible extendable language
QuoteRef: kayAC_1996 ;;Kay, The early history of Smalltalk, with transcript of presentation
QuoteRef: keizG6_1993 ;;Keizer, ClarisWorks has a document approach
QuoteRef: kellD5_1990 ;;Keller, A guide to natural naming
QuoteRef: kemeCF2_1993 ;;Kemerer, Reliability of function points measurement
QuoteRef: kemmB9_2000 ;;Kemme, Alonso, A new approach to developing and implementing eager database replication protocols
QuoteRef: kennA6_2001 ;;Kennedy, Syme, Design and implementation of generics for the .NET common language runtime
QuoteRef: kennMS3_1983 ;;Kenniston, et al Implementation Issues II (session summary)
QuoteRef: kentJ8_1988 ;;Kent, Terry, Orr, Browsing Electronic Mail: Experiences interfacing a mail system to a DBMS
QuoteRef: kentW1_1984 ;;Kent, Fact-based data analysis and design
QuoteRef: kentW1_1985 ;;Kent, The realities of Data: Basic properties of data reconsidered
QuoteRef: kentW2_1989 ;;Kent, The many forms of a single fact
QuoteRef: kentW6_1991 ;;Kent, A rigorous model of object reference, identity, and existence
QuoteRef: kentW_1978 ;;Kent, Data and reality
QuoteRef: kentW_1978x ;;Kent, Data and reality
QuoteRef: keppE10_1977 ;;Keppel, Kropp, Interactive programming by end-users
QuoteRef: kernBW1_1979 ;;Kernighan, Mashey, The UNIX programming environment
QuoteRef: kernBW7_1998 ;;Kernighan, van Wyk, Timing trials, or the trials of timing: Experiments with scripting and user-interface languages
QuoteRef: kernBW9_1978 ;;Kernighan, UNIX for beginners -- Second edition
QuoteRef: kernBW_1973 ;;Kernighan, Plauger, Programming style for programmers and language designers
QuoteRef: kernBW_1975 ;;Kernighan, Plauger, Software tools
QuoteRef: kerrST_1986 ;;Kerr, Transition for page to screen
QuoteRef: keslTE11_1984 ;;Kesler, et al The effect of indentation on program comprehension
QuoteRef: kherL9_1978 ;;Kheriaty, WADUZITDO: How to write a language in 256 words or less
QuoteRef: kiebRB9_1973 ;;Kieburtz, Syntax macros and the elaboration of data structures
QuoteRef: kigeJI2_1984 ;;Kiger, The depth/breadth trade-off in the design of menu-driven user interfaces
QuoteRef: kilgFG4_1997 ;;Kilgour, Origins of coordinate searching
QuoteRef: kimW12_1991 ;;Kim, Seo, Classifying schematic and data heterogeneity in multidatabase systems
QuoteRef: kimuTD7_1985 ;;Kimura, Gillett, Cox, A design of a data model based on abstraction of symbols
QuoteRef: kingJC7_1976 ;;King, Symbolic execution and program testing
QuoteRef: kistJJ2_1992 ;;Kistler, Satyanarayanan, Disconnected operation in the Coda file system
QuoteRef: kleiDV5_1991 ;;Klein, Foiling the cracker: A survey of, and improvements to, password security
QuoteRef: kleiMH1_1994 ;;Klein, Lehoczky, Rajkumar, Rate-monotonic analysis for real-time industrial computing
QuoteRef: kleiST7_1989 ;;Klein, Bookstein, Deerwester, Storing text retrieval systems on CD-ROM: Compression and encryption considerations
QuoteRef: klerM3_1988 ;;Klerer, Liu, A new benchmark test to estimate optimization quality of compilers
QuoteRef: klinP10_1979 ;;Klint, Line numbers made cheap
QuoteRef: klinR2_1979 ;;Kling, Scacchi, The DOD common high order programming language effort (DOD-1): What will the impacts be?
QuoteRef: knieG5_2001 ;;Kneisel, Theisen, JAC--Access right based encapsulation for Java
QuoteRef: knigJC1_1986 ;;Knight, Leveson, An experimental evaluation of the assumption of independence in multiversion programming
QuoteRef: knigK11_1990 ;;Knight, Connectionist ideas and algorithms
QuoteRef: knobB4_1976 ;;Knobe, Yuval, Some steps towards a better Pascal
QuoteRef: knobK9_1981 ;;Knobe, Early Experience with MONSTRtm: A software maintenance management tool
QuoteRef: knooJ3_1998 ;;Knoop, Koschutzki, Steffen, Basic-block graphs: Living dinosaurs?
QuoteRef: knowK10_1965 ;;Knowlton, A fast storage allocator
QuoteRef: knowK8_1966 ;;Knowlton, A programmer's description of L^_6
QuoteRef: knoxST5_1989 ;;Knox, Bailey, Lynch, Directed dialogue protocols: Verbal data for user interface design
QuoteRef: knudDB_1976 ;;Knudsen, Barofsky, Satz, A modification request control system
QuoteRef: knutDE11_1981 ;;Knuth, Plass, Breaking paragraphs into lines
QuoteRef: knutDE12_1970 ;;Knuth, Von Neumann's first computer program
QuoteRef: knutDE1_1971 ;;Knuth, An empirical study of FORTRAN programming
QuoteRef: knutDE2_1984 ;;Knuth, Literate Programming
QuoteRef: knutDE6_1965 ;;Knuth, On the translation of languages from left to right
QuoteRef: knutDE6_1968 ;;Knuth, Semantics of context free languages
QuoteRef: knutDE7_1972 ;;Knuth, Ancient Babylonian algorithms
QuoteRef: knutDE7_1989 ;;Knuth, The errors of TEX
QuoteRef: knutDE8_1976 ;;Knuth, Pardo, The early development of programming languages
QuoteRef: knutDE_1973 ;;Knuth, The Art of Computer Programming
QuoteRef: knutDE_1977 ;;Knuth, Structured programming with goto statements
QuoteRef: kochM_1967 ;;The Growth of Knowledge
QuoteRef: kochPD11_1987 ;;Koch, Disk file allocation based on the buddy system
QuoteRef: koenA12_1995 ;;Koenig, Stroustrup, Foundations for native C++ styles
QuoteRef: koenA_1990 ;;Koenig, Stroustrup, Exception handling for C++
QuoteRef: kohnM9_1986 ;;Kohno, Miyakawa, Hosoya, Real time synchronization of two robots for coordinated assembly
QuoteRef: kopeH1_1994 ;;Kopetz, Grunsteidl, TTP-A protocol for fault-tolerant real-time systems
QuoteRef: kornGA_1978 ;;Korn, Closing the software gap for interactive mini/microcomputation: Direct execution of microprogrammed block-diagram primitives
QuoteRef: kosiPR9_1973 ;;Kosinski, A data flow language for operating system programming
QuoteRef: kostCH_1974 ;;Koster, Using the CDL compiler-compiler
QuoteRef: kostCH_1974a ;;Koster, Two-level grammers
QuoteRef: kosyDK_1973 ;;Kosy, Approaches to improved program validation through programming language design
QuoteRef: kotlP4_1972 ;;kotler, A generic concept of marketing
QuoteRef: kovaTA11_1978 ;;Kovats, Program readability, closing keywords and prefix-style intermediate keywords
QuoteRef: kowaR11_1973 ;;Kowalski, Predicate logic as programming language
QuoteRef: kralTM5_1975 ;;Kraly, Naughton, Smith, Tinanoff, Program design study
QuoteRef: kramS2_1996 ;;Kramer, Mind, symbolism, formalism: is Leibniz a precursor of artificial intelligence?
QuoteRef: krasG8_1981 ;;Krasner, The Smalltalk-80 virtual machine
QuoteRef: kripSA_1980 ;;Kripke, Naming and Necessity
QuoteRef: kripSA_1982 ;;Kripke, Wittgenstein on Rules and Private Language
QuoteRef: kripS_1975 ;;Kripke, Outline of a theory of truth
QuoteRef: krisSM7_1990 ;;Krishnamurthy, A brief survey of papers on scheduling for pipelined processors
QuoteRef: krolP5_1971 ;;Krolak, Felts, Marble, A man-machine approach toward solving the traveling salesman problem
QuoteRef: krovR4_1992 ;;Krovetz, Croft, Lexical ambiguity and information retrieval
QuoteRef: krueCW6_1992 ;;Krueger, Software reuse
QuoteRef: ksheAD1_1994 ;;Kshemkalyani, Singhal, Efficient detection and resolution of generalized distributed deadlocks
QuoteRef: kugeP9_1979 ;;Kugel, The controversy goes on--"Can computers think?" Part II: What is thinking?
QuoteRef: kuhnDR4_1997 ;;Kuhn, Sources of failure in the public switched telephone network
QuoteRef: kuhnTS_1970 ;;Kuhn, The structure of scientific revolutions 2nd edition
QuoteRef: kumaS6_2001 ;;Kumar, Mandelbaum, Yu, Li, ESP: A language for programmable devices
QuoteRef: kumaS6_2002 ;;Kumar, Li, Dynamic memory management for programmable devices
QuoteRef: kurtS11_1999 ;;Kurtz, Reducing the space requirements of suffix trees
QuoteRef: kuznOP6_1972 ;;Kuznetsov, Makarevskii, Markovskii, Okudshava, Shipilin, Yarus--a language for describing the operation of complex automata
QuoteRef: kwokYK12_1999 ;;Kwok, Ahmad, Static scheduling algorithms for allocating directed task graphs to multiprocessors
QuoteRef: labkC3_1998 ;;Lapkowski, Hendren, Extended SSA numbering: introducing SSA properties to languages with multi-level pointers
QuoteRef: lacyJB10_1993 ;;Lacy, Mitchell, Schell, CryptoLib: Cryptography in software
QuoteRef: lafoF3_1984 ;;Lafora, Soffa, Reverse execution in a generalized control regime
QuoteRef: laiKY10_1988 ;;Lai, Malone, Yu, Object Lens: a "spreadsheet" for coooperative work
QuoteRef: lakaI_1970 ;;Lakatos, Falsification and the methodology of scientific research programmes
QuoteRef: lakaI_1976 ;;Lakatos, Proofs and refutations. The logic of mathematical discovery
QuoteRef: lakoG_1987 ;;Lakoff, Women, Fire and Dangerous Things, What categories reveal about the mind
QuoteRef: lammM9_2000 ;;Lamming, Eldridge, Flynn, Jones, Pendlebury, Satchel: Providing access to any document, any time, anywhere
QuoteRef: lampB11_1992 ;;Lampson, Abadi, Burrows, Wobber, Authentication in distributed systems: Theory and Practice
QuoteRef: lampBW10_1983 ;;Lampson, Hints for computer system design
QuoteRef: lampBW2_1980 ;;Lampson, Redell, Experience with processes and monitors in Mesa
QuoteRef: lampBW3_1971 ;;Lampson, Protection
QuoteRef: lampBW4_1974 ;;Lampson, An open operating system for a single-user machine
QuoteRef: lampBW6_1983 ;;Lampson, Schmidt, Organizing software in a distributed environment
QuoteRef: lampBW8_1985 ;;Lampson, Designing a global name service
QuoteRef: lampBW_1974 ;;Lampson, Mitchell, Satterthwaite, On the transfer of control between contexts
QuoteRef: lampL1_1976 ;;Lamport, The synchronization of independent processes
QuoteRef: lampL1_1989 ;;Lamport, A simple approach to specifying concurrent systems
QuoteRef: lampL7_1978 ;;Lamport, Time, clocks, and the ordering of events in a distributed system
QuoteRef: lampL7_1990 ;;Lamport, ??win?? and ??sin?? Predicate transformers for concurrency
QuoteRef: lampL_1980 ;;Lamport, The 'Hoare Logic' of concurrent programs
QuoteRef: landCE9_1994 ;;Landwehr, Bull, McDermott, Choi, A taxonomy of computer program security flaws
QuoteRef: landGP11_1987 ;;Landow, Relationally encoded links and the rhetoric of hypertext
QuoteRef: landPJ3_1966 ;;Landin, The next 700 programming languages
QuoteRef: landPJ_1966 ;;Landin, A .lambda.-calculus approach
QuoteRef: landTK7_1983 ;;Landauer, Galotti, Hartwell, Natural command names and initial learning: A study of text-editing terms
QuoteRef: larmJ9_1978 ;;Larmouth, Scheduling for immediate turnaround
QuoteRef: larsPA10_1980 ;;Larson, Linear hashing with partial expansions
QuoteRef: larsPA10_1998 ;;Larson, Krishnan, Memory allocation for long-running server applications
QuoteRef: larsPA4_1988 ;;Larson, Dynamic hash tables
QuoteRef: larsPA9_1988 ;;Larson, Linear hashing with separators--A dynamic hashing scheme achieving one- access retrieval
QuoteRef: laueHC_1979 ;;Lauer, Satterthwait, The impact of Mesa on system design
QuoteRef: lauePE_1979 ;;Lauer, Torrigiani, Shields, COSY--a system specification language based on paths and processes
QuoteRef: laueS7_2001 ;;Lauesen, Harning, Virtual windows: linking user tasks, data models, and interface design
QuoteRef: laurB_1991 ;;Laurel, Computers as Theatre
QuoteRef: lautL6_1989 ;;Lauterbach, Randall, Experimental evaluation of six test techniques
QuoteRef: layzD12_1975 ;;Layzer, The arrow of time
QuoteRef: leag1_1992 ;;The League for Programming Freedom Against software patents
QuoteRef: leavBM4_1970 ;;Leavenworth, Towards an extensible language
QuoteRef: leavBM7_1977 ;;Leavenworth, Structure debugging using a domain specific language
QuoteRef: leavBM9_1970 ;;Leavenworth, Functional Data Structures
QuoteRef: leavGT2_1984 ;;Leavens, Prettyprinting styles for various languages.
QuoteRef: leblDB11_1987 ;;Leblang, Chase, Parallel software configuration management in a network environment
QuoteRef: leblDB5_1984 ;;Leblang, Chase, Computer-aided software engineering in a distributed workstation environment
QuoteRef: lechR_1973 ;;Lechner, Stallings, A minisystem programming language
QuoteRef: lecrT7_1995 ;;Lecroq, Experimental results on string matching algorithms
QuoteRef: lecuP10_1990 ;;L'Ecuyer, Random numbers for simulation
QuoteRef: lecuP3_1991 ;;L'Ecuyer, Cote, Implementing a random number package with splitting facilities
QuoteRef: ledgH10_1980 ;;Ledgard, Whiteside, Singer, Seymour, The natural language of interactive systems.
QuoteRef: ledgHF10_1980 ;;Ledgard, A human engineered variant to BNF
QuoteRef: ledgHF11_1975 ;;Ledgard, Marcotty, A genealogy of control structures
QuoteRef: ledgHF11_1980 ;;Ledgard, Whiteside, Seymour, Singer, An experiment on human engineering of interactive software
QuoteRef: ledgHF7_1977 ;;Ledgard, Singer, Hueras, A basis for executing Pascal programmers
QuoteRef: ledgHF9_1971 ;;Ledgard, Ten mini-languages: a study of topical issues in programming languages
QuoteRef: ledgHF_1975 ;;Ledgard, Programming proverbs
QuoteRef: ledgH_1981 ;;Ledgard, Singer, Whiteside, Directions in Human Factors for Interactive Systems
QuoteRef: leeBH1_1987 ;;Lee, Lee, Collision-free motion planning of two robots
QuoteRef: leeCS_1986 ;;Lee, Gonszalez, Fu, Tutorial on Robotics, 2nd edition
QuoteRef: leeD9_1997 ;;Lee, Noh, Choi, Min, Choe, Cho, Implementation and performance evaluation of the LRFU replacement policy
QuoteRef: leeE4_1993 ;;Lee, Whalen, Computer image retrieval by features: Suspect identification
QuoteRef: leeEA9_2000 ;;Lee, What's ahead for embedded software?
QuoteRef: leeI6_1996 ;;Lee, Pitt, Iyer, Efficient service of rediscovered software problems
QuoteRef: leeJ1_1990 ;;Lee, Malone, Partially shared views: A scheme for communicating among groups that use different type hierarchies
QuoteRef: leeJ3_1988 ;;Lee, Malone, How can groups communicate when they use different languages?
QuoteRef: leePJ1_1990 ;;Lee, Secure user access control for public networks
QuoteRef: lefuC1_2000 ;;Lefurgy, Piccininni, Mudge, Reducing code size with run-time decompression
QuoteRef: lehmF12_1988 ;;Lehman, letter to the editor
QuoteRef: lehmMM11_1982 ;;Lehman, Program evolution
QuoteRef: lehmMM3_1981 ;;Lehman, On understanding laws, evolution, and conservation in the large-program life cycle
QuoteRef: lehmMM9_1980 ;;Lehman, Programs, life cycles, and laws of software evolution
QuoteRef: leibGW3_1714 ;;von Leibniz, letter to Pierre Remond de Montmort, March 14, 1714 [French]
QuoteRef: leibGW4_1679 ;;Leibniz, Elements of a Calculus
QuoteRef: leibGW5_1705 ;;Leibniz, letter to Basnage de Beauval [editor]
QuoteRef: leibGW_1666 ;;Leibniz, Dissertatio de arte combinatoria [Dissertation on the art of combinations]
QuoteRef: leibGW_1670 ;;Leibniz, Elements of Natural Law
QuoteRef: leibGW_1679 ;;Leibniz, Philosophical Writings
QuoteRef: leibGW_1679a ;;Leibniz, On the general characteristic
QuoteRef: leibGW_1685 ;;von Leibniz, paper XX on ??calculus universalis??
QuoteRef: leibGW_1686 ;;Leibniz, General investigation concerning the analysis of concepts and truths
QuoteRef: leibGW_1697 ;;Leibniz, Omnibus ex nihilo ...
QuoteRef: leinDW5_1980 ;;Leinbaugh, Indenting for the compiler
QuoteRef: lenaDB10_1982 ;;Lenat, The nature of heuristics
QuoteRef: lenaDB1_1991 ;;Lenat, Feigenbaum, On the thresholds of knowledge
QuoteRef: lenaDB3_1983 ;;Lenat, EURISKO: A program that leans new heuristics and domain concepts. The nature of heuristics III: Program design and results
QuoteRef: lenaDB8_1984 ;;Lenat, Brown, Why AM and EURISKO appear to work
QuoteRef: leonAJ11_1971 ;;Leonard, Tribe, Notable features of Orion
QuoteRef: leon_1202 ;;Leonardo of Pisa, Liber abaci
QuoteRef: leroX1_1998 ;;Leroy, Rouaix, Security properties of typed applets
QuoteRef: leskM3_1988 ;;Lesk, GRAB--Inverted indexes with low storage overhead
QuoteRef: leuFC2_2000 ;;Leu, Tsai, Tang, An efficient external sorting algorithm
QuoteRef: levaY10_2001 ;;Lebanon, Pet rank, An on-the-fly reference counting garbage collector for Java
QuoteRef: leveB7_1980 ;;Leverett, Szymanski, Chaining span-dependent jump instructions
QuoteRef: leveNG4_1990 ;;Leveson, Cha, Knight, Shimeall, The use of self checks and voting in software error detection: An empirical study
QuoteRef: leveNG7_1993 ;;Leveson, Turner, An investigation of the Therac-25 accidents
QuoteRef: leviJ5_1980 ;;Levine, Why a lisp-based command language?
QuoteRef: leviT7_1960 ;;Levitt, Marketing Myopia
QuoteRef: levyEB11_1982 ;;Levy, The case against Pascal as a teaching tool
QuoteRef: levyS_1984 ;;Levy, Hackers. Heroes of the computer revolution
QuoteRef: lianS10_1998 ;;Liang, Bracha, Dynamic class loading in the Java virtual machine
QuoteRef: liblB6_2003 ;;Liblit, Zheng, Aiken, Jordan, Bug isolation via remote program sampling
QuoteRef: lickJC_1960 ;;Licklider, Man-computer symbiosis
QuoteRef: liebH11_1986 ;;Lieberman, Using prototypical objects to implement shared behavior in object oriented systems
QuoteRef: liebKJ9_1989 ;;Lieberherr, Holland, Assuring good style for object-oriented programs
QuoteRef: liebLI7_1977 ;;Lieberman, Wesley, AUTOPASS: An automatic programming system for computer controlled mechanical assembly
QuoteRef: liedJ1_1994 ;;Liedtke, A short note on implementing "new" machine instructions by software for efficient test of page accessibility
QuoteRef: lienBP6_1978 ;;Lientz, Swanson, Tompkins, Chacteristics of application software maintenance
QuoteRef: limTF3_1999 ;;Lim, Pardyak, Bershad, A memory-efficient real-time non-copying garbage collector
QuoteRef: linAD5_1963 ;;Lin, Key addressing of random access memories by radix transformation
QuoteRef: linCH1_1995 ;;Lin, Chang, Lee, A new public-key cipher system based upon the Diophantine equations
QuoteRef: linWC3_1979 ;;Lin, Lee, Du, Common properties of some multiattribute file systems
QuoteRef: lindC_1981 ;;Linden, Electronic seal--a new method to protect valuable data files
QuoteRef: lindO_1992 ;;Linderholm, Mind Melding
QuoteRef: lindRK6_1993 ;;Lindsay, Buchanan, Feigenbaum, Lederberg, DENDRAL: a case study of the first expert system for scientific hypothesis formation
QuoteRef: lingRC10_1988 ;;Linger, Mills, A case study in Cleanroom software engineering: The IBM COBOL structuring facility
QuoteRef: lingRC5_1993 ;;Linger, Cleanroom software engineering for zero-defect software
QuoteRef: lingRC6_1975 ;;Linger, Mills, Definitional text in structured programming
QuoteRef: linhA8_2000 ;;Linhares, A glimpse of the metaphysics of Bongard problems
QuoteRef: linsC7_1990 ;;Lins, Programming without enumerations in Oberon
QuoteRef: linsRD12_1992 ;;Lins, Cyclic reference counting with lazy mark-scan
QuoteRef: liptRJ2_1977 ;;Lipton, Snyder, On the power of applicative languages
QuoteRef: liskB10_1981 ;;Liskov, Report on the Workshop on Fundamental Issues in Distributed Computing
QuoteRef: liskB4_1974 ;;Liskov, Programming with abstract data types
QuoteRef: liskB9_1989 ;;Liskov, Shrira, Wroclawski, Efficient at-most-once messages based on synchronized clocks
QuoteRef: liskBH11_1979 ;;Liskov, Snyder, Exception handling in CLU
QuoteRef: liskBH2_1976 ;;Liskov, An introduction to CLU
QuoteRef: liskB_1996 ;;Liskov, A history of CLU, with transcript of presentation
QuoteRef: littB11_1993 ;;Littlewood, Strigini, Validation of ultrahigh dependability for software-based systems
QuoteRef: littDC12_1987 ;;Littman, Pinto, Letovsky, Soloway, Mental models and software maintenance
QuoteRef: litwW10_1980 ;;Litwin, Linear hashing : a new tool for file and table addressing
QuoteRef: litwWA7_1991 ;;Litwin, Roussopoulos, Levy, Hong, Trie hashing with controlled load
QuoteRef: liuCL1_1973 ;;Liu, Layland, Scheduling algorithms for multiprogramming in a hard-real-time environment
QuoteRef: liuYA1_2000 ;;Liu, Stoller, From recursion to iteration: what are the optimizations
QuoteRef: liuZ2_1998 ;;Liu, Du, Ishii, An improved adaptive string searching algorithm
QuoteRef: ljunS2_1988 ;;Ljungkvist, Letter to the editor
QuoteRef: lomaM1_1995 ;;Lomas, Christianson, Remote booting in a hostile world. To whom am I speaking?
QuoteRef: lomeD6_1989 ;;Lomet, Salzberg, Access methods for multiversion data
QuoteRef: lomeDB1_1975 ;;Lomet, Schema for invalidating references to freed storage
QuoteRef: lomeDB1_1985 ;;Lomet, Making pointers safe in system programming languages
QuoteRef: lomeD_1993 ;;Lomet, Salzberg, Transaction-time databases
QuoteRef: longAC4_2000 ;;Long. A.C. Jr. Landay, Rowe, Michiels, Visual similarity of pen gestures
QuoteRef: longAC5_1999 ;;Long, Landay, Rowe, Implications for a gesture design tool
QuoteRef: lopiP3_1983 ;;Lopiccola, Wrege, Visicorp's VisiOn
QuoteRef: loreMP19_1997 ;;Lorenzo, The editors Aristotle and Aristotelianism, Assessment and nature of Aristotelianism
QuoteRef: loseRM3_1997 ;;Losee, A discipline independent definition of information
QuoteRef: lotsJ8_2002 ;;Lotspiech, Nusser, Pestoni, Broadcast encryption's bright future
QuoteRef: louiRP8_1996 ;;Loui, Why GAWK for AI?
QuoteRef: louxMJ_1970 ;;Loux, The problem of universals
QuoteRef: lowGC1_1990 ;;Low, Jeffery, Function points in the estimation and evaluation of the software process
QuoteRef: lowJR5_1978 ;;Low, Automatic data structure selection: an example and overview
QuoteRef: loweDG8_1985 ;;Lowe, Co-operative structuring of information: the representation of reasoning and debate.
QuoteRef: lozaT7_1983 ;;Lozano-Perez, Robot programming
QuoteRef: lubkD6_1991 ;;Lubkin, Heterogeneous configuration management with DSEE
QuoteRef: luccS6_2000 ;;Lucco, Split-stream dictionary program compression
QuoteRef: luhJY2_1983 ;;Luh, An anatomy of industrial robots and their controls
QuoteRef: lumVY4_1971 ;;Lum, Yuen, Dodd, Key-to-address transform techniques: a fundamental performance study on large existing formatted files

Related Topics up

ThesaHelp: references a-b (396 items)
ThesaHelp: references c-d (337 items)
ThesaHelp: references e-f (168 items)
ThesaHelp: references g-h (299 items)
ThesaHelp: references i-l (342 items)
ThesaHelp: references m-o (268 items)
ThesaHelp: references p-r (245 items)
ThesaHelp: references sa-sz (237 items)
ThesaHelp: references t-z
(309 items)

Updated barberCB 2/04
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.