Browse
Contact
/
Login
Upload
Search Results for 'Execution Spec'
Overcoming Hard-Faults in
faustina-dinatale
Counterexample Generation for Separation-Logic-Based Proofs
myesha-ticknor
Parallel Debugging Techniques
myesha-ticknor
Urgent Virtual Machine Eviction with Enlightened Post-Copy
tatiana-dople
WIREFRAME: Supporting Data-dependent Parallelism through Dependency Graph Execution in
mitsue-stanley
Finding Liveness Bugs In Distributed Systems
lois-ondreau
Copyright © 2009 Elsevier
tatyana-admore
MISTAKES TO AVOID IN PROJECT EXECUTION
kittie-lecroy
Code In The Air : Simplifying Tasking on Smartphones
faustina-dinatale
Prescient Memory: Exposing Weak Memory Model Behavior by Lo
liane-varnes
Other Distributed Frameworks
danika-pritchard
Prescient Memory: Exposing Weak Memory Model Behavior by Lo
olivia-moreira
Supplier/Distributor Playbook
ellena-manuel
1789-1799 French Revolution
giovanna-bartolotta
Moments platform
alida-meadow
Modeling Enforcement Mechanisms with Security Automata
luanne-stotts
Static Process Scheduling
alida-meadow
Stash: Have Your Scratchpad and Cache it Too
briana-ranney
Aspect Oriented Development
myesha-ticknor
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic
tatyana-admore
1 Chapter 9 Objectives Learn the properties that often distinguish RISC from CISC architectures.
test
Optimizing Expected Time Utility in Cyber-Physical Systems Schedulers
alexa-scheidler
Vector and symbolic processors
stefany-barnette
The role of dynamic and static volatility
tawny-fly
31
32
33
34
35
36
37
38
39
40
41