QuoteRef: ibm_1982 ;;IBM ad
|
QuoteRef: ichbJD_1972 ;;Ichbiah, Morse, General concepts of the Simula 67 programming language
|
QuoteRef: ichbJD_1973 ;;Ichbiah, Rissen, Heliard, The two-level approach to data independence programming in the LIS system implementation language
|
QuoteRef: ignaS10_1998 ;;Ignatchenko, An algorithm for online data compression
|
QuoteRef: induB3_1986 ;;Indurkhya, Stone, Xi-Cheng, Optimal partitioning of randomly generated distributed programs
|
QuoteRef: ingaD10_1997 ;;Ingalls, Kaehler, Maloney, Wallace, Kay, Back to the future. The story of Squeak, a practical Smalltalk written in itself
|
QuoteRef: ingaDH8_1981 ;;Ingalls, The Smalltalk graphics kernel
|
QuoteRef: ingaDH8_1981a ;;Ingalls, Design principles behind Smalltalk
|
QuoteRef: ingaDH9_1982 ;;Ingalls, Why operating systems may disappear
|
QuoteRef: ingaDH9_1986 ;;Ingalls, A simple technique for handling multiple polymorphism
|
QuoteRef: ingePZ1_1961 ;;Ingerman, Thunks, a way of compiling procedure statements with some comments on procedure declarations
|
QuoteRef: inouH_1984 ;;Inoue, Inaba, Hand-eye coordination in rope handling
|
QuoteRef: instrumentcontrol
|
QuoteRef: ironET1_1969 ;;Irons, Experience with an extensible language
|
QuoteRef: ishiK10_2000 ;;Ishizaki, Kawahito, Yasue, Komatsu, Noakatani, A study of devirtualization techniques for a Java just-in-time compiler OOPSLA '00
|
QuoteRef: ivieEL10_1977 ;;Ivie, The programmer's workbench--a machine for software development
|
QuoteRef: ivorMY12_2001 ;;Ivory, Hearst, The state of the art in automating usability evaluation of user interfaces
|
QuoteRef: jackD6_1993 ;;Jackson, Abstract analysis with Aspect
|
QuoteRef: jackMA2_1984 ;;Jackson, Software composition
|
QuoteRef: jackMA5_1976 ;;Jackson, Information systems: modeling, sequencing and transformations
|
QuoteRef: jackMA_1975 ;;Jackson, Principles of Program Design
|
QuoteRef: jackMA_1977 ;;Jackson, The Jackson design methodology
|
QuoteRef: jacoRJ4_1990 ;;Jacob, What you look at is what you get: Eye movement-based interaction techniques
|
QuoteRef: jacoSC4_1986 ;;Jacobsen, Iversen, Knutti, Johnson, Biggers, Design of the UTAH/M.I.T. dextrous hand
|
QuoteRef: jaesG12_1981 ;;Jaeschke, Reciprocal hashing: A method for generating minimal perfect hashing functions
|
QuoteRef: jainAK9_1999 ;;Jain, Murty, Flynn, Data clustering: a review
|
QuoteRef: jainR10_1985 ;;Jain, Chlamtac, The P^2 algorithm for dynamic calculation of quantiles and histograms without storing observations.
|
QuoteRef: jakiSL_1969 ;;Jaki, Brain, Mind and Computers
|
QuoteRef: jameJS9_1978 ;;James, FORTH for microcomputers
|
QuoteRef: jameW_1890 ;;James, The Principles of Psychology
|
QuoteRef: jansBJ1_1998 ;;Jansen, Spink, Bateman, Sarcevic, Real life information retrieval: a study of user queries on the web
|
QuoteRef: jansP4_1997 ;;Janson, Tsudik, Yung, Scalability and flexibility in authentication services: the ??KryptoKnight?? approach
|
QuoteRef: jansP9_1995 ;;Janson, Tsudik, Secure and minimal protocols for authenticated key distribution
|
QuoteRef: jardDA5_1981 ;;Jardine, Davis, A data-base application design language
|
QuoteRef: jazeJM7_2001 ;;Jezequel, Deveaux, Le Traon, Reliable objects: lightweight testing for OO languages
|
QuoteRef: jeffDR5_1993 ;;Jeffery, Low, Barnes, A comparison of function point counting techniques
|
QuoteRef: jeffDR7_1985 ;;Jefferson, Virtual time
|
QuoteRef: jenaSK3_1999 ;;Jena, An improved Lempel-Ziv algorithm for sequential data compression
|
QuoteRef: jenkB9_1997 ;;Jenkins, Hash functions
|
QuoteRef: jenkRJ2_1996 ;;Jenkins, ISAAC
|
QuoteRef: jensC4_2000 ;;Jensen, Farnham, Drucker, Kollock, The effect of communication modality on cooperation in online environments
|
QuoteRef: jimT5_2000 ;;Jim, SD3: a trust management system with certified evaluation
|
QuoteRef: jiroM12_1993 ;;Jirotk, Luff, Heath, Requirements for technology in complex environments: Tasks and interaction in a city dealing room
|
QuoteRef: johnJ9_1989 ;;Johnson, Roberts, Verplank, Smith, Irby, Beard, Mackey, The Xerox Star: A retrospective
|
QuoteRef: johnMS10_1998 ;;Johnstone, Wilson, The memory fragmentation problem: solved?
|
QuoteRef: johnMS2_1982 ;;Johnson, A software debugging glossary
|
QuoteRef: johnMS3_1982 ;;Johnson, Some requirements for architectural support of software debugging
|
QuoteRef: johnRI3_1976 ;;Johnson, Mories, Abstract data types in the Model programming language
|
QuoteRef: johnRK3_1982 ;;Johnsson, Wick, An overview of the Mesa processor architecture
|
QuoteRef: johnSC7_1978a ;;Johnson, Ritchie, Portability of C programs and the UNIX system
|
QuoteRef: johnSC7_1978b ;;Johnson, Lesk, UNIX time-sharing system: Language development tools
|
QuoteRef: johnS_1747 ;;Johnson, The plan of an English dictionary, submitted to the right honourable Phillip Dormer, Earl of Chesterfield
|
QuoteRef: johnS_1755 ;;Johnson, A Dictionary of the English Language in which the words are deduced from their origin and illustrated in their different significations by examples from the best writers
|
QuoteRef: joneAK4_1976 ;;Jones, Liskov, An access control facility for programming languages
|
QuoteRef: joneAK5_1978 ;;Jones, A language extension for expressing constraints on data access
|
QuoteRef: joneR_1996 ;;Jones, Lins, Garbage collection: algorithms for automatic dynamic memory management
|
QuoteRef: joneSL2_1986 ;;Jones, Parsing distfix operators
|
QuoteRef: joneSP9_2000 ;;Jones, Eber, Seward, Composing contracts: an adventure in financial engineering
|
QuoteRef: joneTC1_1977 ;;Jones, Program quality and programmer productivity
|
QuoteRef: joneTC4_1979 ;;Jones, A survey of programming design and specification techniques
|
QuoteRef: joneTC4_1979a ;;Jones, An overview of programming architectures and design languages
|
QuoteRef: joneTC4_1979b ;;Jones, An overview of programming architectures and design languages
|
QuoteRef: joneTC6_1977 ;;Jones, Psychology, Linguistics, and Physics in Northern India and China from the 6th century B.C. to the 9th century A.D.
|
QuoteRef: joneTC8_1981 ;;Jones, Alternatives to programming
|
QuoteRef: joneWP1_1986 ;;Jones, Dumais, The spatial metaphor for user interfaces: Experimental tests of reference by location versus name
|
QuoteRef: joneWP9_1987 ;;Jones, How do we distinguish the hyper from the hype in non-linear- text
|
QuoteRef: jonesTC12_1981 ;;Jones, Defect removal: A look at the state of the art
|
QuoteRef: jonsD8_1987 ;;Jonsson, Pancode and boxcharts: Structured programming revisited
|
QuoteRef: kabbP4_1993 ;;Kabbash, MacKenzie, Buxton, Human performance using computer input devices in the preferred and non-preferred hands
|
QuoteRef: kaehT9_1986 ;;Kaehler, Virtual memory on a narrow machine for an object-oriented language
|
QuoteRef: kakaY9_1985 ;;Kakazu, Nakamura, Kamimura, Okino, A study on cooperative robot motion simulation
|
QuoteRef: kandE3_1998 ;;Kandogan, Shneiderman, Elastic windows: design, implementation, and evaluation of multi-window operations
|
QuoteRef: kantE7_1986 ;;Kantorowitz, Laor, Automatic generation of useful syntax error messages
|
QuoteRef: kantI_1781 ;;Kant, Critique of Pure Reason
|
QuoteRef: kaplSJ7_1990 ;;Kaplan, Kapor, Belove, Landsman, Drake, Agenda: A personal information manager
|
QuoteRef: kapoAA1_1978 ;;Kaposi, An algebra of algorithms and its application to program design and maintenance
|
QuoteRef: karaCM12_1998 ;;Karat, Guaranteeing rights for the user
|
QuoteRef: karaCM5_1999 ;;Karat, Halverson, Horn, Karat, Patterns of entry and correction in large vocabulary continuous speech recognition systems
|
QuoteRef: karaV6_1999 ;;Karamcheti, Li, Pechtchanski, Yap, A core library for robust numeric and geometric computation
|
QuoteRef: kareR3_1994 ;;Karedla, Love, Wherry, Caching strategies to improve disk system performance
|
QuoteRef: kariRR7_1987 ;;Karinthi, Weiser, Incremental re-execution of programs
|
QuoteRef: karrM5_1978 ;;Karr, Loveman, Incorporation of units into programming languages
|
QuoteRef: karrM6_1984 ;;Karr, Code generation by coagulation
|
QuoteRef: karyG8_1999 ;;Karypis, Han, Kumar, Chameleon: hierarchical clustering using dynamic modeling
|
QuoteRef: kastU_1980 ;;Kastens, Ordered Attributed grammars
|
QuoteRef: kaszM10_1999 ;;Kaszkiel, Zobel, Sacks-Davis, Efficient passage ranking for document databases
|
QuoteRef: katzJ12_1971 ;;Katzenelson, Milgram, A short presentation of the main features of AEPL--An extensible programming languages
|
QuoteRef: katzJ5_1979 ;;Katzenelson, Clusters and dialogues for set implementations
|
QuoteRef: katzJH_1963 ;;Katz, McGee, An experiment in non-procedural programming
|
QuoteRef: katzL_1981 ;;Katzschner, Van den Brande, ITT 1240 Digital Exchange, Software concepts and implementation
|
QuoteRef: katzN1_1972 ;;Katzman, Nyenhuis, Color vs. Blank-and-white effects on learning, opinion, and attention,
|
QuoteRef: kaufW_1980 ;;Kaufmann, Discovering the mind, Volume two, Nietzsche, Heidegger, and Buber
|
QuoteRef: kawaK11_2002 ;;Kawachiya, Koseki, Onodera, Lock reservation: Java locks can mostly do without atomic operations
|
QuoteRef: kawaM11_2000 ;;Kawahito, Komatsu, Nakatani, Effective null pointer check elimination utilizing hardware trap
|
QuoteRef: kayA3_1977 ;;Kay, Goldberg, Personal dynamic media
|
QuoteRef: kayA3_1993 ;;Kay, The history of Smalltalk
|
QuoteRef: kayAC6_1968 ;;Kay, Flex--a flexible extendable language
|
QuoteRef: kayAC_1996 ;;Kay, The early history of Smalltalk, with transcript of presentation
|
QuoteRef: keizG6_1993 ;;Keizer, ClarisWorks has a document approach
|
QuoteRef: kellD5_1990 ;;Keller, A guide to natural naming
|
QuoteRef: kemeCF2_1993 ;;Kemerer, Reliability of function points measurement
|
QuoteRef: kemmB9_2000 ;;Kemme, Alonso, A new approach to developing and implementing eager database replication protocols
|
QuoteRef: kennA6_2001 ;;Kennedy, Syme, Design and implementation of generics for the .NET common language runtime
|
QuoteRef: kennMS3_1983 ;;Kenniston, et al Implementation Issues II (session summary)
|
QuoteRef: kentJ8_1988 ;;Kent, Terry, Orr, Browsing Electronic Mail: Experiences interfacing a mail system to a DBMS
|
QuoteRef: kentW1_1984 ;;Kent, Fact-based data analysis and design
|
QuoteRef: kentW1_1985 ;;Kent, The realities of Data: Basic properties of data reconsidered
|
QuoteRef: kentW2_1989 ;;Kent, The many forms of a single fact
|
QuoteRef: kentW6_1991 ;;Kent, A rigorous model of object reference, identity, and existence
|
QuoteRef: kentW_1978 ;;Kent, Data and reality
|
QuoteRef: kentW_1978x ;;Kent, Data and reality
|
QuoteRef: keppE10_1977 ;;Keppel, Kropp, Interactive programming by end-users
|
QuoteRef: kernBW1_1979 ;;Kernighan, Mashey, The UNIX programming environment
|
QuoteRef: kernBW7_1998 ;;Kernighan, van Wyk, Timing trials, or the trials of timing: Experiments with scripting and user-interface languages
|
QuoteRef: kernBW9_1978 ;;Kernighan, UNIX for beginners -- Second edition
|
QuoteRef: kernBW_1973 ;;Kernighan, Plauger, Programming style for programmers and language designers
|
QuoteRef: kernBW_1975 ;;Kernighan, Plauger, Software tools
|
QuoteRef: kerrST_1986 ;;Kerr, Transition for page to screen
|
QuoteRef: keslTE11_1984 ;;Kesler, et al The effect of indentation on program comprehension
|
QuoteRef: kherL9_1978 ;;Kheriaty, WADUZITDO: How to write a language in 256 words or less
|
QuoteRef: kiebRB9_1973 ;;Kieburtz, Syntax macros and the elaboration of data structures
|
QuoteRef: kigeJI2_1984 ;;Kiger, The depth/breadth trade-off in the design of menu-driven user interfaces
|
QuoteRef: kilgFG4_1997 ;;Kilgour, Origins of coordinate searching
|
QuoteRef: kimW12_1991 ;;Kim, Seo, Classifying schematic and data heterogeneity in multidatabase systems
|
QuoteRef: kimuTD7_1985 ;;Kimura, Gillett, Cox, A design of a data model based on abstraction of symbols
|
QuoteRef: kingJC7_1976 ;;King, Symbolic execution and program testing
|
QuoteRef: kistJJ2_1992 ;;Kistler, Satyanarayanan, Disconnected operation in the Coda file system
|
QuoteRef: kleiDV5_1991 ;;Klein, Foiling the cracker: A survey of, and improvements to, password security
|
QuoteRef: kleiMH1_1994 ;;Klein, Lehoczky, Rajkumar, Rate-monotonic analysis for real-time industrial computing
|
QuoteRef: kleiST7_1989 ;;Klein, Bookstein, Deerwester, Storing text retrieval systems on CD-ROM: Compression and encryption considerations
|
QuoteRef: klerM3_1988 ;;Klerer, Liu, A new benchmark test to estimate optimization quality of compilers
|
QuoteRef: klinP10_1979 ;;Klint, Line numbers made cheap
|
QuoteRef: klinR2_1979 ;;Kling, Scacchi, The DOD common high order programming language effort (DOD-1): What will the impacts be?
|
QuoteRef: knieG5_2001 ;;Kneisel, Theisen, JAC--Access right based encapsulation for Java
|
QuoteRef: knigJC1_1986 ;;Knight, Leveson, An experimental evaluation of the assumption of independence in multiversion programming
|
QuoteRef: knigK11_1990 ;;Knight, Connectionist ideas and algorithms
|
QuoteRef: knobB4_1976 ;;Knobe, Yuval, Some steps towards a better Pascal
|
QuoteRef: knobK9_1981 ;;Knobe, Early Experience with MONSTRtm: A software maintenance management tool
|
QuoteRef: knooJ3_1998 ;;Knoop, Koschutzki, Steffen, Basic-block graphs: Living dinosaurs?
|
QuoteRef: knowK10_1965 ;;Knowlton, A fast storage allocator
|
QuoteRef: knowK8_1966 ;;Knowlton, A programmer's description of L^_6
|
QuoteRef: knoxST5_1989 ;;Knox, Bailey, Lynch, Directed dialogue protocols: Verbal data for user interface design
|
QuoteRef: knudDB_1976 ;;Knudsen, Barofsky, Satz, A modification request control system
|
QuoteRef: knutDE11_1981 ;;Knuth, Plass, Breaking paragraphs into lines
|
QuoteRef: knutDE12_1970 ;;Knuth, Von Neumann's first computer program
|
QuoteRef: knutDE1_1971 ;;Knuth, An empirical study of FORTRAN programming
|
QuoteRef: knutDE2_1984 ;;Knuth, Literate Programming
|
QuoteRef: knutDE6_1965 ;;Knuth, On the translation of languages from left to right
|
QuoteRef: knutDE6_1968 ;;Knuth, Semantics of context free languages
|
QuoteRef: knutDE7_1972 ;;Knuth, Ancient Babylonian algorithms
|
QuoteRef: knutDE7_1989 ;;Knuth, The errors of TEX
|
QuoteRef: knutDE8_1976 ;;Knuth, Pardo, The early development of programming languages
|
QuoteRef: knutDE_1973 ;;Knuth, The Art of Computer Programming
|
QuoteRef: knutDE_1977 ;;Knuth, Structured programming with goto statements
|
QuoteRef: kochM_1967 ;;The Growth of Knowledge
|
QuoteRef: kochPD11_1987 ;;Koch, Disk file allocation based on the buddy system
|
QuoteRef: koenA12_1995 ;;Koenig, Stroustrup, Foundations for native C++ styles
|
QuoteRef: koenA_1990 ;;Koenig, Stroustrup, Exception handling for C++
|
QuoteRef: kohnM9_1986 ;;Kohno, Miyakawa, Hosoya, Real time synchronization of two robots for coordinated assembly
|
QuoteRef: kopeH1_1994 ;;Kopetz, Grunsteidl, TTP-A protocol for fault-tolerant real-time systems
|
QuoteRef: kornGA_1978 ;;Korn, Closing the software gap for interactive mini/microcomputation: Direct execution of microprogrammed block-diagram primitives
|
QuoteRef: kosiPR9_1973 ;;Kosinski, A data flow language for operating system programming
|
QuoteRef: kostCH_1974 ;;Koster, Using the CDL compiler-compiler
|
QuoteRef: kostCH_1974a ;;Koster, Two-level grammers
|
QuoteRef: kosyDK_1973 ;;Kosy, Approaches to improved program validation through programming language design
|
QuoteRef: kotlP4_1972 ;;kotler, A generic concept of marketing
|
QuoteRef: kovaTA11_1978 ;;Kovats, Program readability, closing keywords and prefix-style intermediate keywords
|
QuoteRef: kowaR11_1973 ;;Kowalski, Predicate logic as programming language
|
QuoteRef: kralTM5_1975 ;;Kraly, Naughton, Smith, Tinanoff, Program design study
|
QuoteRef: kramS2_1996 ;;Kramer, Mind, symbolism, formalism: is Leibniz a precursor of artificial intelligence?
|
QuoteRef: krasG8_1981 ;;Krasner, The Smalltalk-80 virtual machine
|
QuoteRef: kripSA_1980 ;;Kripke, Naming and Necessity
|
QuoteRef: kripSA_1982 ;;Kripke, Wittgenstein on Rules and Private Language
|
QuoteRef: kripS_1975 ;;Kripke, Outline of a theory of truth
|
QuoteRef: krisSM7_1990 ;;Krishnamurthy, A brief survey of papers on scheduling for pipelined processors
|
QuoteRef: krolP5_1971 ;;Krolak, Felts, Marble, A man-machine approach toward solving the traveling salesman problem
|
QuoteRef: krovR4_1992 ;;Krovetz, Croft, Lexical ambiguity and information retrieval
|
QuoteRef: krueCW6_1992 ;;Krueger, Software reuse
|
QuoteRef: ksheAD1_1994 ;;Kshemkalyani, Singhal, Efficient detection and resolution of generalized distributed deadlocks
|
QuoteRef: kugeP9_1979 ;;Kugel, The controversy goes on--"Can computers think?" Part II: What is thinking?
|
QuoteRef: kuhnDR4_1997 ;;Kuhn, Sources of failure in the public switched telephone network
|
QuoteRef: kuhnTS_1970 ;;Kuhn, The structure of scientific revolutions 2nd edition
|
QuoteRef: kumaS6_2001 ;;Kumar, Mandelbaum, Yu, Li, ESP: A language for programmable devices
|
QuoteRef: kumaS6_2002 ;;Kumar, Li, Dynamic memory management for programmable devices
|
QuoteRef: kurtS11_1999 ;;Kurtz, Reducing the space requirements of suffix trees
|
QuoteRef: kuznOP6_1972 ;;Kuznetsov, Makarevskii, Markovskii, Okudshava, Shipilin, Yarus--a language for describing the operation of complex automata
|
QuoteRef: kwokYK12_1999 ;;Kwok, Ahmad, Static scheduling algorithms for allocating directed task graphs to multiprocessors
|
QuoteRef: labkC3_1998 ;;Lapkowski, Hendren, Extended SSA numbering: introducing SSA properties to languages with multi-level pointers
|
QuoteRef: lacyJB10_1993 ;;Lacy, Mitchell, Schell, CryptoLib: Cryptography in software
|
QuoteRef: lafoF3_1984 ;;Lafora, Soffa, Reverse execution in a generalized control regime
|
QuoteRef: laiKY10_1988 ;;Lai, Malone, Yu, Object Lens: a "spreadsheet" for coooperative work
|
QuoteRef: lakaI_1970 ;;Lakatos, Falsification and the methodology of scientific research programmes
|
QuoteRef: lakaI_1976 ;;Lakatos, Proofs and refutations. The logic of mathematical discovery
|
QuoteRef: lakoG_1987 ;;Lakoff, Women, Fire and Dangerous Things, What categories reveal about the mind
|
QuoteRef: lammM9_2000 ;;Lamming, Eldridge, Flynn, Jones, Pendlebury, Satchel: Providing access to any document, any time, anywhere
|
QuoteRef: lampB11_1992 ;;Lampson, Abadi, Burrows, Wobber, Authentication in distributed systems: Theory and Practice
|
QuoteRef: lampBW10_1983 ;;Lampson, Hints for computer system design
|
QuoteRef: lampBW2_1980 ;;Lampson, Redell, Experience with processes and monitors in Mesa
|
QuoteRef: lampBW3_1971 ;;Lampson, Protection
|
QuoteRef: lampBW4_1974 ;;Lampson, An open operating system for a single-user machine
|
QuoteRef: lampBW6_1983 ;;Lampson, Schmidt, Organizing software in a distributed environment
|
QuoteRef: lampBW8_1985 ;;Lampson, Designing a global name service
|
QuoteRef: lampBW_1974 ;;Lampson, Mitchell, Satterthwaite, On the transfer of control between contexts
|
QuoteRef: lampL1_1976 ;;Lamport, The synchronization of independent processes
|
QuoteRef: lampL1_1989 ;;Lamport, A simple approach to specifying concurrent systems
|
QuoteRef: lampL7_1978 ;;Lamport, Time, clocks, and the ordering of events in a distributed system
|
QuoteRef: lampL7_1990 ;;Lamport, ??win?? and ??sin?? Predicate transformers for concurrency
|
QuoteRef: lampL_1980 ;;Lamport, The 'Hoare Logic' of concurrent programs
|
QuoteRef: landCE9_1994 ;;Landwehr, Bull, McDermott, Choi, A taxonomy of computer program security flaws
|
QuoteRef: landGP11_1987 ;;Landow, Relationally encoded links and the rhetoric of hypertext
|
QuoteRef: landPJ3_1966 ;;Landin, The next 700 programming languages
|
QuoteRef: landPJ_1966 ;;Landin, A .lambda.-calculus approach
|
QuoteRef: landTK7_1983 ;;Landauer, Galotti, Hartwell, Natural command names and initial learning: A study of text-editing terms
|
QuoteRef: larmJ9_1978 ;;Larmouth, Scheduling for immediate turnaround
|
QuoteRef: larsPA10_1980 ;;Larson, Linear hashing with partial expansions
|
QuoteRef: larsPA10_1998 ;;Larson, Krishnan, Memory allocation for long-running server applications
|
QuoteRef: larsPA4_1988 ;;Larson, Dynamic hash tables
|
QuoteRef: larsPA9_1988 ;;Larson, Linear hashing with separators--A dynamic hashing scheme achieving one- access retrieval
|
QuoteRef: laueHC_1979 ;;Lauer, Satterthwait, The impact of Mesa on system design
|
QuoteRef: lauePE_1979 ;;Lauer, Torrigiani, Shields, COSY--a system specification language based on paths and processes
|
QuoteRef: laueS7_2001 ;;Lauesen, Harning, Virtual windows: linking user tasks, data models, and interface design
|
QuoteRef: laurB_1991 ;;Laurel, Computers as Theatre
|
QuoteRef: lautL6_1989 ;;Lauterbach, Randall, Experimental evaluation of six test techniques
|
QuoteRef: layzD12_1975 ;;Layzer, The arrow of time
|
QuoteRef: leag1_1992 ;;The League for Programming Freedom Against software patents
|
QuoteRef: leavBM4_1970 ;;Leavenworth, Towards an extensible language
|
QuoteRef: leavBM7_1977 ;;Leavenworth, Structure debugging using a domain specific language
|
QuoteRef: leavBM9_1970 ;;Leavenworth, Functional Data Structures
|
QuoteRef: leavGT2_1984 ;;Leavens, Prettyprinting styles for various languages.
|
QuoteRef: leblDB11_1987 ;;Leblang, Chase, Parallel software configuration management in a network environment
|
QuoteRef: leblDB5_1984 ;;Leblang, Chase, Computer-aided software engineering in a distributed workstation environment
|
QuoteRef: lechR_1973 ;;Lechner, Stallings, A minisystem programming language
|
QuoteRef: lecrT7_1995 ;;Lecroq, Experimental results on string matching algorithms
|
QuoteRef: lecuP10_1990 ;;L'Ecuyer, Random numbers for simulation
|
QuoteRef: lecuP3_1991 ;;L'Ecuyer, Cote, Implementing a random number package with splitting facilities
|
QuoteRef: ledgH10_1980 ;;Ledgard, Whiteside, Singer, Seymour, The natural language of interactive systems.
|
QuoteRef: ledgHF10_1980 ;;Ledgard, A human engineered variant to BNF
|
QuoteRef: ledgHF11_1975 ;;Ledgard, Marcotty, A genealogy of control structures
|
QuoteRef: ledgHF11_1980 ;;Ledgard, Whiteside, Seymour, Singer, An experiment on human engineering of interactive software
|
QuoteRef: ledgHF7_1977 ;;Ledgard, Singer, Hueras, A basis for executing Pascal programmers
|
QuoteRef: ledgHF9_1971 ;;Ledgard, Ten mini-languages: a study of topical issues in programming languages
|
QuoteRef: ledgHF_1975 ;;Ledgard, Programming proverbs
|
QuoteRef: ledgH_1981 ;;Ledgard, Singer, Whiteside, Directions in Human Factors for Interactive Systems
|
QuoteRef: leeBH1_1987 ;;Lee, Lee, Collision-free motion planning of two robots
|
QuoteRef: leeCS_1986 ;;Lee, Gonszalez, Fu, Tutorial on Robotics, 2nd edition
|
QuoteRef: leeD9_1997 ;;Lee, Noh, Choi, Min, Choe, Cho, Implementation and performance evaluation of the LRFU replacement policy
|
QuoteRef: leeE4_1993 ;;Lee, Whalen, Computer image retrieval by features: Suspect identification
|
QuoteRef: leeEA9_2000 ;;Lee, What's ahead for embedded software?
|
QuoteRef: leeI6_1996 ;;Lee, Pitt, Iyer, Efficient service of rediscovered software problems
|
QuoteRef: leeJ1_1990 ;;Lee, Malone, Partially shared views: A scheme for communicating among groups that use different type hierarchies
|
QuoteRef: leeJ3_1988 ;;Lee, Malone, How can groups communicate when they use different languages?
|
QuoteRef: leePJ1_1990 ;;Lee, Secure user access control for public networks
|
QuoteRef: lefuC1_2000 ;;Lefurgy, Piccininni, Mudge, Reducing code size with run-time decompression
|
QuoteRef: lehmF12_1988 ;;Lehman, letter to the editor
|
QuoteRef: lehmMM11_1982 ;;Lehman, Program evolution
|
QuoteRef: lehmMM3_1981 ;;Lehman, On understanding laws, evolution, and conservation in the large-program life cycle
|
QuoteRef: lehmMM9_1980 ;;Lehman, Programs, life cycles, and laws of software evolution
|
QuoteRef: leibGW3_1714 ;;von Leibniz, letter to Pierre Remond de Montmort, March 14, 1714 [French]
|
QuoteRef: leibGW4_1679 ;;Leibniz, Elements of a Calculus
|
QuoteRef: leibGW5_1705 ;;Leibniz, letter to Basnage de Beauval [editor]
|
QuoteRef: leibGW_1666 ;;Leibniz, Dissertatio de arte combinatoria [Dissertation on the art of combinations]
|
QuoteRef: leibGW_1670 ;;Leibniz, Elements of Natural Law
|
QuoteRef: leibGW_1679 ;;Leibniz, Philosophical Writings
|
QuoteRef: leibGW_1679a ;;Leibniz, On the general characteristic
|
QuoteRef: leibGW_1685 ;;von Leibniz, paper XX on ??calculus universalis??
|
QuoteRef: leibGW_1686 ;;Leibniz, General investigation concerning the analysis of concepts and truths
|
QuoteRef: leibGW_1697 ;;Leibniz, Omnibus ex nihilo ...
|
QuoteRef: leinDW5_1980 ;;Leinbaugh, Indenting for the compiler
|
QuoteRef: lenaDB10_1982 ;;Lenat, The nature of heuristics
|
QuoteRef: lenaDB1_1991 ;;Lenat, Feigenbaum, On the thresholds of knowledge
|
QuoteRef: lenaDB3_1983 ;;Lenat, EURISKO: A program that leans new heuristics and domain concepts. The nature of heuristics III: Program design and results
|
QuoteRef: lenaDB8_1984 ;;Lenat, Brown, Why AM and EURISKO appear to work
|
QuoteRef: leonAJ11_1971 ;;Leonard, Tribe, Notable features of Orion
|
QuoteRef: leon_1202 ;;Leonardo of Pisa, Liber abaci
|
QuoteRef: leroX1_1998 ;;Leroy, Rouaix, Security properties of typed applets
|
QuoteRef: leskM3_1988 ;;Lesk, GRAB--Inverted indexes with low storage overhead
|
QuoteRef: leuFC2_2000 ;;Leu, Tsai, Tang, An efficient external sorting algorithm
|
QuoteRef: levaY10_2001 ;;Lebanon, Pet rank, An on-the-fly reference counting garbage collector for Java
|
QuoteRef: leveB7_1980 ;;Leverett, Szymanski, Chaining span-dependent jump instructions
|
QuoteRef: leveNG4_1990 ;;Leveson, Cha, Knight, Shimeall, The use of self checks and voting in software error detection: An empirical study
|
QuoteRef: leveNG7_1993 ;;Leveson, Turner, An investigation of the Therac-25 accidents
|
QuoteRef: leviJ5_1980 ;;Levine, Why a lisp-based command language?
|
QuoteRef: leviT7_1960 ;;Levitt, Marketing Myopia
|
QuoteRef: levyEB11_1982 ;;Levy, The case against Pascal as a teaching tool
|
QuoteRef: levyS_1984 ;;Levy, Hackers. Heroes of the computer revolution
|
QuoteRef: lianS10_1998 ;;Liang, Bracha, Dynamic class loading in the Java virtual machine
|
QuoteRef: liblB6_2003 ;;Liblit, Zheng, Aiken, Jordan, Bug isolation via remote program sampling
|
QuoteRef: lickJC_1960 ;;Licklider, Man-computer symbiosis
|
QuoteRef: liebH11_1986 ;;Lieberman, Using prototypical objects to implement shared behavior in object oriented systems
|
QuoteRef: liebKJ9_1989 ;;Lieberherr, Holland, Assuring good style for object-oriented programs
|
QuoteRef: liebLI7_1977 ;;Lieberman, Wesley, AUTOPASS: An automatic programming system for computer controlled mechanical assembly
|
QuoteRef: liedJ1_1994 ;;Liedtke, A short note on implementing "new" machine instructions by software for efficient test of page accessibility
|
QuoteRef: lienBP6_1978 ;;Lientz, Swanson, Tompkins, Chacteristics of application software maintenance
|
QuoteRef: limTF3_1999 ;;Lim, Pardyak, Bershad, A memory-efficient real-time non-copying garbage collector
|
QuoteRef: linAD5_1963 ;;Lin, Key addressing of random access memories by radix transformation
|
QuoteRef: linCH1_1995 ;;Lin, Chang, Lee, A new public-key cipher system based upon the Diophantine equations
|
QuoteRef: linWC3_1979 ;;Lin, Lee, Du, Common properties of some multiattribute file systems
|
QuoteRef: lindC_1981 ;;Linden, Electronic seal--a new method to protect valuable data files
|
QuoteRef: lindO_1992 ;;Linderholm, Mind Melding
|
QuoteRef: lindRK6_1993 ;;Lindsay, Buchanan, Feigenbaum, Lederberg, DENDRAL: a case study of the first expert system for scientific hypothesis formation
|
QuoteRef: lingRC10_1988 ;;Linger, Mills, A case study in Cleanroom software engineering: The IBM COBOL structuring facility
|
QuoteRef: lingRC5_1993 ;;Linger, Cleanroom software engineering for zero-defect software
|
QuoteRef: lingRC6_1975 ;;Linger, Mills, Definitional text in structured programming
|
QuoteRef: linhA8_2000 ;;Linhares, A glimpse of the metaphysics of Bongard problems
|
QuoteRef: linsC7_1990 ;;Lins, Programming without enumerations in Oberon
|
QuoteRef: linsRD12_1992 ;;Lins, Cyclic reference counting with lazy mark-scan
|
QuoteRef: liptRJ2_1977 ;;Lipton, Snyder, On the power of applicative languages
|
QuoteRef: liskB10_1981 ;;Liskov, Report on the Workshop on Fundamental Issues in Distributed Computing
|
QuoteRef: liskB4_1974 ;;Liskov, Programming with abstract data types
|
QuoteRef: liskB9_1989 ;;Liskov, Shrira, Wroclawski, Efficient at-most-once messages based on synchronized clocks
|
QuoteRef: liskBH11_1979 ;;Liskov, Snyder, Exception handling in CLU
|
QuoteRef: liskBH2_1976 ;;Liskov, An introduction to CLU
|
QuoteRef: liskB_1996 ;;Liskov, A history of CLU, with transcript of presentation
|
QuoteRef: littB11_1993 ;;Littlewood, Strigini, Validation of ultrahigh dependability for software-based systems
|
QuoteRef: littDC12_1987 ;;Littman, Pinto, Letovsky, Soloway, Mental models and software maintenance
|
QuoteRef: litwW10_1980 ;;Litwin, Linear hashing : a new tool for file and table addressing
|
QuoteRef: litwWA7_1991 ;;Litwin, Roussopoulos, Levy, Hong, Trie hashing with controlled load
|
QuoteRef: liuCL1_1973 ;;Liu, Layland, Scheduling algorithms for multiprogramming in a hard-real-time environment
|
QuoteRef: liuYA1_2000 ;;Liu, Stoller, From recursion to iteration: what are the optimizations
|
QuoteRef: liuZ2_1998 ;;Liu, Du, Ishii, An improved adaptive string searching algorithm
|
QuoteRef: ljunS2_1988 ;;Ljungkvist, Letter to the editor
|
QuoteRef: lomaM1_1995 ;;Lomas, Christianson, Remote booting in a hostile world. To whom am I speaking?
|
QuoteRef: lomeD6_1989 ;;Lomet, Salzberg, Access methods for multiversion data
|
QuoteRef: lomeDB1_1975 ;;Lomet, Schema for invalidating references to freed storage
|
QuoteRef: lomeDB1_1985 ;;Lomet, Making pointers safe in system programming languages
|
QuoteRef: lomeD_1993 ;;Lomet, Salzberg, Transaction-time databases
|
QuoteRef: longAC4_2000 ;;Long. A.C. Jr. Landay, Rowe, Michiels, Visual similarity of pen gestures
|
QuoteRef: longAC5_1999 ;;Long, Landay, Rowe, Implications for a gesture design tool
|
QuoteRef: lopiP3_1983 ;;Lopiccola, Wrege, Visicorp's VisiOn
|
QuoteRef: loreMP19_1997 ;;Lorenzo, The editors Aristotle and Aristotelianism, Assessment and nature of Aristotelianism
|
QuoteRef: loseRM3_1997 ;;Losee, A discipline independent definition of information
|
QuoteRef: lotsJ8_2002 ;;Lotspiech, Nusser, Pestoni, Broadcast encryption's bright future
|
QuoteRef: louiRP8_1996 ;;Loui, Why GAWK for AI?
|
QuoteRef: louxMJ_1970 ;;Loux, The problem of universals
|
QuoteRef: lowGC1_1990 ;;Low, Jeffery, Function points in the estimation and evaluation of the software process
|
QuoteRef: lowJR5_1978 ;;Low, Automatic data structure selection: an example and overview
|
QuoteRef: loweDG8_1985 ;;Lowe, Co-operative structuring of information: the representation of reasoning and debate.
|
QuoteRef: lozaT7_1983 ;;Lozano-Perez, Robot programming
|
QuoteRef: lubkD6_1991 ;;Lubkin, Heterogeneous configuration management with DSEE
|
QuoteRef: luccS6_2000 ;;Lucco, Split-stream dictionary program compression
|
QuoteRef: luhJY2_1983 ;;Luh, An anatomy of industrial robots and their controls
|
QuoteRef: lumVY4_1971 ;;Lum, Yuen, Dodd, Key-to-address transform techniques: a fundamental performance study on large existing formatted files
|