Abstract
No abstract available.
Cited By
- Kwiatkowski Ł and Verhoef C (2015). Reducing operational costs through MIPS management, Science of Computer Programming, 98:P4, (551-588), Online publication date: 1-Feb-2015.
- Vanderbauwhede W List-based Monadic Computations for Dynamically Typed Languages Proceedings of the Workshop on Dynamic Languages and Applications, (1-7)
- Kilpeläinen P (2011). Checking determinism of XML Schema content models in optimal time, Information Systems, 36:3, (596-617), Online publication date: 1-May-2011.
- Chaudhuri A, Naldurg P and Rajamani S (2009). A type system for data-flow integrity on Windows Vista, ACM SIGPLAN Notices, 43:12, (9-20), Online publication date: 28-Feb-2009.
- Chaudhuri A, Naldurg P and Rajamani S A type system for data-flow integrity on windows vista Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (89-100)
- McCamant S and Ernst M Quantitative information flow as network flow capacity Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (193-205)
- McCamant S and Ernst M (2008). Quantitative information flow as network flow capacity, ACM SIGPLAN Notices, 43:6, (193-205), Online publication date: 30-May-2008.
- Hirzel M, Nystrom N, Bloom B and Vitek J Matchete Proceedings of the 10th international conference on Practical aspects of declarative languages, (150-166)
- Kiciman E and Livshits B (2007). AjaxScope, ACM SIGOPS Operating Systems Review, 41:6, (17-30), Online publication date: 14-Oct-2007.
- Kiciman E and Livshits B AjaxScope Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, (17-30)
- Hunt E Exhaustive peptide searching using relations Proceedings of the 24th British national conference on Databases, (13-24)
- Sheehan R (2007). Teaching operating systems with ruby, ACM SIGCSE Bulletin, 39:3, (38-42), Online publication date: 25-Jun-2007.
- Sheehan R Teaching operating systems with ruby Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (38-42)
- Lissel R, Gerlach J and GmbH R Introducing new verification methods into a company's design flow Proceedings of the conference on Design, automation and test in Europe, (689-694)
- Veerman N (2006). Automated mass maintenance of a software portfolio, Science of Computer Programming, 62:3, (287-317), Online publication date: 15-Oct-2006.
- Yau C, Tan Y, Fong A and Yu W Hardware concurrent garbage collection for short-lived objects in mobile java devices Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (47-56)
- Livshits V and Lam M Finding security vulnerabilities in java applications with static analysis Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (18-18)
- Mooney R and Bunescu R (2005). Mining knowledge from text using information extraction, ACM SIGKDD Explorations Newsletter, 7:1, (3-10), Online publication date: 1-Jun-2005.
- Jayakumar N and Khatri S A metal and via maskset programmable VLSI design methodology using PLAs Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (590-594)
- Kilpeläinen P and Tuhkanen R Towards efficient implementation of XML schema content models Proceedings of the 2004 ACM symposium on Document engineering, (239-241)
- Walker B (2004). The BAT, Journal of Computing Sciences in Colleges, 19:4, (241-245), Online publication date: 1-Apr-2004.
- Candea G, Cutler J and Fox A (2004). Improving availability with recursive microreboots, Performance Evaluation, 56:1-4, (213-248), Online publication date: 1-Mar-2004.
- Krebs W and Bourne P Statistical and Visual Morph Movie Analysis of Crystallographic Mutant Selection Bias in Protein Mutation Resource Data Proceedings of the IEEE Computer Society Conference on Bioinformatics
- Scott D, Beresford A and Mycroft A Spatial security policies for mobile agents in a sentient computing environment Proceedings of the 6th international conference on Fundamental approaches to software engineering, (102-117)
- Laurent B and Karger T A System to Validate and Certify Soft and Hard IP Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
- Park Y Identification of probable real words Proceedings of the ACL-02 workshop on Unsupervised lexical acquisition - Volume 9, (1-8)
- Goswami D, Singh A and Preiss B (2002). From Design Patterns to Parallel Architectural Skeletons, Journal of Parallel and Distributed Computing, 62:4, (669-695), Online publication date: 1-Apr-2002.
- Finkel R, Zaslavsky A, Monostori K and Schmidt H (2018). Signature extraction for overlap detection in documents, Australian Computer Science Communications, 24:1, (59-64), Online publication date: 1-Jan-2002.
- Finkel R, Zaslavsky A, Monostori K and Schmidt H Signature extraction for overlap detection in documents Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (59-64)
- Graunke P, Findler R, Krishnamurthi S and Felleisen M Automatically Restructuring Programs for the Web Proceedings of the 16th IEEE international conference on Automated software engineering
- Yao A CVSSearch Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
- Lehman M and Ramil J (2019). Rules and Tools for Software Evolution Planning and Management, Annals of Software Engineering, 11:1, (15-44), Online publication date: 7-Nov-2001.
- Levanoni Y and Petrank E (2019). An on-the-fly reference counting garbage collector for Java, ACM SIGPLAN Notices, 36:11, (367-380), Online publication date: 1-Nov-2001.
- Visser J (2019). Visitor combination and traversal control, ACM SIGPLAN Notices, 36:11, (270-282), Online publication date: 1-Nov-2001.
- Levanoni Y and Petrank E An on-the-fly reference counting garbage collector for Java Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (367-380)
- Visser J Visitor combination and traversal control Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (270-282)
- Coady Y, Kiczales G, Feeley M and Smolyn G Using aspectC to improve the modularity of path-specific customization in operating system code Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (88-98)
- Coady Y, Kiczales G, Feeley M and Smolyn G (2019). Using aspectC to improve the modularity of path-specific customization in operating system code, ACM SIGSOFT Software Engineering Notes, 26:5, (88-98), Online publication date: 1-Sep-2001.
- Hart D, Tudoreanu M and Kraemer E Mobile agents for monitoring distributed systems Proceedings of the fifth international conference on Autonomous agents, (232-233)
- Murphy G, Notkin D and Sullivan K (2001). Software Reflexion Models, IEEE Transactions on Software Engineering, 27:4, (364-380), Online publication date: 1-Apr-2001.
- Weerawarana S, Curbera F, Duftler M, Epstein D and Kesselman J Bean markup language Proceedings of the 6th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 6, (13-13)
- Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P and Gligor V SubDomain: Parsimonious Server Security Proceedings of the 14th USENIX conference on System administration, (355-368)
- Osterlund R PIKT: Problem Informant/Killer Tool Proceedings of the 14th USENIX conference on System administration, (147-166)
- Walker R and Murphy G Implicit context Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of software engineering: twenty-first century applications, (69-78)
- Walker R and Murphy G (2019). Implicit context, ACM SIGSOFT Software Engineering Notes, 25:6, (69-78), Online publication date: 1-Nov-2000.
- Ramil J Algorithmic cost estimation for software evolution Proceedings of the 22nd international conference on Software engineering, (701-703)
- Duc N and Sakurai T Compact yet high performance (CyHP) library for short time-to-market with new technologies Proceedings of the 2000 Asia and South Pacific Design Automation Conference, (475-480)
- Nakanishi T and Saeki M Using Multiple Graphs of Programs to Modify Specifications Proceedings of the Sixth Asia Pacific Software Engineering Conference
- Liddle S, Campbell D and Crawford C Automatically extracting structure and data from business reports Proceedings of the eighth international conference on Information and knowledge management, (86-93)
- Tseng Y Content-based retrieval for music collections Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, (176-182)
- Cheong Y and Jarzabek S Frame-based method for customizing generic software architectures Proceedings of the 1999 symposium on Software reusability, (103-112)
- Atkins D, Ball T, Bruns G and Cox K (1999). Mawl, IEEE Transactions on Software Engineering, 25:3, (334-346), Online publication date: 1-May-1999.
- Warner W and Sunderraman R Network documentation Proceedings of the 1st conference on Conference on Network Administration - Volume 1, (4-4)
- Kazman R and Carrière S (1999). Playing Detective, Automated Software Engineering, 6:2, (107-138), Online publication date: 1-Apr-1999.
- Reguero I, Foster D and Deloose I Large Scale Print Spool Service Proceedings of the 12th USENIX conference on System administration, (229-242)
- Arnold B Accountworks: Users Create Accounts on SQL, Notes, NT, and UNIX Proceedings of the 12th USENIX conference on System administration, (49-62)
- Purakayastha A and Mohindra A System Management With NetScript Proceedings of the 12th USENIX conference on System administration, (37-48)
- Agnihotri P, Agarwala V, Nucciarone J, Morooney K and Das C The Penn State computing condominium scheduling system Proceedings of the 1998 ACM/IEEE conference on Supercomputing, (1-23)
- Skidmore J, Sottile M, Cuny J and Malony A A prototype notebook-based environment for computational tools Proceedings of the 1998 ACM/IEEE conference on Supercomputing, (1-15)
- Moreau L (2019). A Syntactic Theory of Dynamic Binding, Higher-Order and Symbolic Computation, 11:3, (233-279), Online publication date: 1-Oct-1998.
- Nilsson K, Blomdell A and Laurin O (2019). Open Embedded Control, Real-Time Systems, 14:3, (325-343), Online publication date: 1-May-1998.
- Baniassad E and Murphy G Conceptual module querying for software reengineering Proceedings of the 20th international conference on Software engineering, (64-73)
- Kienhuis B, Deprettere E, Vissers K and van der Wolf P The construction of a retargetable simulator for an architecture template Proceedings of the 6th international workshop on Hardware/software codesign, (125-129)
- Owen C and Makedon F (1998). Asml, Multimedia Tools and Applications, 6:2, (113-139), Online publication date: 1-Mar-1998.
- Sabin R and Yap T Integrating information retrieval techniques with traditional DB methods in a Web-based database browser Proceedings of the 1998 ACM symposium on Applied Computing, (760-766)
- Schranz M Engineering flexible World Wide Web services Proceedings of the 1998 ACM symposium on Applied Computing, (712-718)
- Ames C, Burleigh S and Mitchell S A web based enterprise workflow system Proceedings of the 1997 ACM International Conference on Supporting Group Work, (214-220)
- Luerkens C, Bartelme M, Sizer K and Lande J Integrating windows 95/NT into an existing UNIX enterprise network Proceedings of the 1997 Workshop on Large Scale System Administration of Windows NT, (3-3)
- Disz T, Olson R and Stevens R Performance model of the Argonne Voyager multimedia server Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors
- Owen C The IMAGETCL multimedia algorithm development system Proceedings of the 5th conference on Annual Tcl/Tk Workshop 1997 - Volume 5, (13-13)
- Schneider C A parallel/serial trade-off methodology for look-up table based decoders Proceedings of the 34th annual Design Automation Conference, (498-503)
- Liu L and Pu C (2019). An Adaptive Object-Oriented Approach to Integration and Access ofHeterogeneous Information Sources, Distributed and Parallel Databases, 5:2, (167-205), Online publication date: 1-Apr-1997.
- Schneider C A Methodology for Hardware Architecture Trade-off at Different Levels of Abstraction Proceedings of the 1997 European conference on Design and Test
- Curtis R (1997). A Web based configuration control system for team projects, ACM SIGCSE Bulletin, 29:1, (189-193), Online publication date: 1-Mar-1997.
- Curtis R A Web based configuration control system for team projects Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education, (189-193)
- Osawa N, Morita H and Yuba T Animation for performance debugging of parallel computing systems Proceedings of the second symposium on Virtual reality modeling language, (101-ff.)
- Johnson W and Erdem A (1997). Interactive Explanation of Software Systems, Automated Software Engineering, 4:1, (53-75), Online publication date: 1-Jan-1997.
- Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H (1996). The structure and performance of interpreters, ACM SIGOPS Operating Systems Review, 30:5, (150-159), Online publication date: 1-Dec-1996.
- Liscano R, Impey R, Gordon P and Abu-Hakima S A system for the seamless integration of personal messages using agents developed on a lotus notes platform. Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
- Endler M Availability management of distributed programs and services Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
- Fox A and Gribble S Security on the move Proceedings of the 2nd annual international conference on Mobile computing and networking, (155-164)
- Defert P, Fernandez E, Goossens M, Le Moigne O, Peyrat A and Reguero I Managing and Distributing Application Software Proceedings of the 10th USENIX conference on System administration, (213-226)
- Thomas G, Schroeder J, Orcutt M, Johnson D, Simmelink J and Moore J UNIX Host Administration in a Hererogeneous Distributed Computing Environment Proceedings of the 10th USENIX conference on System administration, (43-50)
- Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H The structure and performance of interpreters Proceedings of the seventh international conference on Architectural support for programming languages and operating systems, (150-159)
- Berbers Y, De Decker B and Joosen W Infrastructure for mobile agents Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (173-180)
- Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H (2019). The structure and performance of interpreters, ACM SIGPLAN Notices, 31:9, (150-159), Online publication date: 1-Sep-1996.
- Hutchins R and Hemmady S How to write Awk and Perl scripts to enable your EDA tools to work together Proceedings of the 33rd annual Design Automation Conference, (409-414)
- Nguyen T and Srinivasan V (2019). Accessing relational databases from the World Wide Web, ACM SIGMOD Record, 25:2, (529-540), Online publication date: 1-Jun-1996.
- Nguyen T and Srinivasan V Accessing relational databases from the World Wide Web Proceedings of the 1996 ACM SIGMOD international conference on Management of data, (529-540)
- Watson B and Shafer K Creating custom SGML DTDs for documentation products Proceedings of the 13th annual international conference on Systems documentation: emerging from chaos: solutions for the growing complexity of our jobs, (189-196)
- Griswold R and Griswold M History of the Icon programming language History of programming languages---II, (599-624)
- Villacis J and Gannon D A web interface to parallel program source code archetypes Proceedings of the 1995 ACM/IEEE conference on Supercomputing, (18-es)
- Sedayao J and Akita K LACHESIS: A Tool for Benchmarking Internet Service Providers Proceedings of the 9th USENIX conference on System administration, (111-116)
- Shapiro J (1995). Prototyping Algorithms in Perl, Linux Journal, 1995:16es, (5-es), Online publication date: 1-Aug-1995.
- Pollice G Using a very high level language to build families of high quality reusable components Proceedings of the USENIX 1994 Very High Level Languages Symposium Proceedings on USENIX 1994 Very High Level Languages Symposium Proceedings, (11-11)
- Curry T Profiling and tracing dynamic library usage via interposition Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (18-18)
- Stein L, Marquis A, Dredge E, Reeve M, Daly M, Rozen S and Goodman N Splicing UNIX into a genome mapping laboratory Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (15-15)
- Perl S and Weihl W Performance assertion checking Proceedings of the fourteenth ACM symposium on Operating systems principles, (134-145)
- Perl S and Weihl W (2019). Performance assertion checking, ACM SIGOPS Operating Systems Review, 27:5, (134-145), Online publication date: 1-Dec-1993.
- Maffeis S (1993). File access patterns in public FTP archives and an index for locality of reference, ACM SIGMETRICS Performance Evaluation Review, 20:3, (22-35), Online publication date: 1-Mar-1993.
- Musliner D, Dolter J and Shin K BIBDB Proceedings of the 1992 ACM conference on Computer-supported cooperative work, (386-393)
- Kajler N CAS/PI Papers from the international symposium on Symbolic and algebraic computation, (376-386)
- Deerwester S, Waclena K and LaMar M A textual object management system Proceedings of the 15th annual international ACM SIGIR conference on Research and development in information retrieval, (126-139)
Index Terms
- Programming perl