Map
Index
Random
Help
Group
Notes
Related
th

ThesaHelp: references c-d

topic root > Group: all references


--related--
all references
references a-b
references e-f
references g-h
references i-l
references m-o
references p-r
references sa-sz
references t-z

--referenced--
all Thesa topics

Summary

Quotation references starting with 'c' or 'd'.

Group members up

QuoteRef: cabaJ5_2016 ;;Caballero, J., Lin, Z., Type inference on executables
QuoteRef: cabrB7_2007 ;;Cabral, B., Marques, P., Exception handling: a field study in Java and .NET
QuoteRef: cadaC10_2006 ;;Cadar, C. et al., EXE: automatically generating inputs of death
QuoteRef: caiHG9_1985 ;;Cai, H.G., Wang, Z.X., A self-teaching technique of an arc welding robot with three degree of freedom
QuoteRef: caiY6_2012 ;;Cai, Y., Chan, W.K., MagicFuzzer: Scalable deadlock detection for large-scale applications
QuoteRef: cainSH_1975 ;;Caine, S.H., Gordon, E.K., PDL--A tool for software design
QuoteRef: calcI12_2018 ;;Calciu, I. et al., How to implement any concurrent data structure
QuoteRef: callO10_2014 ;;Callau, O. et al., On the use of type predicates in object-oriented software: The case of Smalltalk
QuoteRef: callaO1_2013 ;;Callau, O., Tanter, E., Programming with ghosts
QuoteRef: calzS10_2016 ;;Calzavara, S. et al., Surviving the web: a journey into web session security
QuoteRef: cameJR2_1986 ;;Cameron, J.R., An overview of JSD
QuoteRef: campB7_1988 ;;Campbell, B., Goodman, J.M., HAM: A general purpose hypertext abstract machine
QuoteRef: campJ_1982 ;;Campbell, J., Grammatical Man
QuoteRef: campM1_1980 ;;Campbell-Kelly, M., Programming the EDSAC: early programming activity at the University of Cambridge
QuoteRef: campM4_1980 ;;Campbell-Kelly, M.,, Programming the Mark I: Early programming activity at the University of Manchester
QuoteRef: campM4_1981 ;;Campbell-Kelly, M., Programming the Pilot ACE: Early programming activity at the National Physical Library
QuoteRef: campM8_2020 ;;Campbell, M., Putting the passe into passwords: How passwordless technologies are reshaping digital identity [NewQuotes]
QuoteRef: campN_1921 ;;Campbell, N., What is Science?
QuoteRef: campNR_1919 ;;Campbell, N.R., Physics: the elements [OK]
QuoteRef: campNR_1920 ;;Campbell, N.R., Physics, The elements [OK NewQuotes]
QuoteRef: campS12_2017 ;;Campani, S. et al., Automatically accelerating non-numerical programs by architecture-compiler co-design
QuoteRef: cannA3_2001 ;;Cannane, A., Williams, H.E., General-purpose compression for efficient retrieval
QuoteRef: cannA7_2002 ;;Cannane, A., Williams, H.E., A general-purpose compression scheme for large collections
QuoteRef: cannDJ6_2000 ;;Cannarozzi, D.J. et al., Contaminated garbage Collection
QuoteRef: cantB2_2006 ;;Cantrill, Br., Hidden in plain sight
QuoteRef: caoM6_2016 ;;Cao, M. et al., Prescient memory: exposing weak memory model behavior by looking into the future
QuoteRef: caplM12_1987 ;;Caplinger, M., An information system based on distributed objects
QuoteRef: caraL5_2014 ;;Carata, L. et al., A primer on provenance
QuoteRef: carbJG3_1978 ;;Carbonell, J.G., Schank, R.C., Comments on the paper of Cherniavsky. On artificial intelligence and attempts to disprove its existence.
QuoteRef: cardDN3_1987 ;;Card, D.N., Agresti, W.W., Resolving the software science anomaly
QuoteRef: cardL6_1984 ;;Cardelli, L., A semantics of multiple inheritance
QuoteRef: cardL_1991 ;;Cardelli, L. et al., [Modula-3:] Language definition
QuoteRef: cardN2_2017 ;;Cardwell, N. et al., BBR: congestion-based congestion control
QuoteRef: cardSK3_1979 ;;Card, S.K. et al., The keystroke-level model for user performance time with interactive systems
QuoteRef: cardSK7_1980 ;;Card, S.K. et al., The keystroke-level model for user performance time with interactive systems
QuoteRef: cardSK_1983 ;;Card, S.K. et al., The psychology of human-computer interaction
QuoteRef: cardSK4_1991 ;;Card, S.K. et al., A morphological analysis of the design space of input devices
QuoteRef: cargT11_1994 ;;Cargill, T., Exception handling: A false sense of security
QuoteRef: cargTA10_1987 ;;Cargill, T.A., Locanthi, B.N., Cheap Hardware support for software debugging and profiling
QuoteRef: cargTA12_1991 ;;Cargill, T.A., The case against multiple inheritance in C++
QuoteRef: carlBD6_2006 ;;Carlstrom, B.D. et al., The ATOMOS transactional programming language
QuoteRef: carlPA_1988 ;;Carlson, P.A., Hypertext: A way of incorporating user feedback into online documentation
QuoteRef: carlS2_1991 ;;Carlsson, S. et al., A new compacting garbage-collection algorithm with a good average-case performance
QuoteRef: carnR_1931 ;;Carnap, R., The logicist foundations of mathematics
QuoteRef: carrJ4_2001 ;;Carroll, J., What the old can teach the young
QuoteRef: carrJM4_1982 ;;Carroll, J.M., Thomas, J.C., Metaphor and the cognitive representation of computing systems
QuoteRef: carrJM11_1982 ;;Carroll, J.M., The adventure of getting to know a computer
QuoteRef: carrJM8_1984 ;;Carroll, J.M., Carrithers, C., Training wheels in a user interface
QuoteRef: carrJM10_1986 ;;Carroll, J.M., Campbell, R.L., Softening up hard science: reply to Newell and Card
QuoteRef: carrJM_1987 ;;Carroll, J.M., Rosson, M.B., Paradox of the active user
QuoteRef: carrJM9_1988 ;;Carroll, J.M., Aaronson, A.P., Learning by doing with simulated intelligent help
QuoteRef: carrJM_1990 ;;Carroll, J.M., The Nurnberg Funnel: Designing minimalist instruction for practical computer skill
QuoteRef: carrJW_1985 ;;Carr, J.W. III, The future of programming languages
QuoteRef: carrN4_1989 ;;Carriero, N., Gelernter, D., Linda in context
QuoteRef: cartDG1_1990 ;;Carta, D.G., Two fast implementations of the "minimal standard" random number generator
QuoteRef: cartJL_1979 ;;Carter, J.L., Wegman, M.N., Universal classes of hash functions
QuoteRef: cartL5_1978 ;;Carter, L. et al., Exact and approximate membership testers
QuoteRef: cartR1_1985 ;;Cartwright, R., Types as intervals
QuoteRef: cartWC_1978 ;;Carter, W.C. et al., Microprogram verification considered necessary
QuoteRef: cashPM11_1979 ;;Cashman, P.M., MONSTR Version 1.0 User's Reference Manual
QuoteRef: cashPM1_1980 ;;Cashman, P.M., Holt, A_W., A communication-oriented approach to structuring the software maintenance environment
QuoteRef: cashPM11_1980 ;;Cashman, P.M. et al., Set Manipulation and working groups: A specification for proposed MONSTR services
QuoteRef: cashPM2_1985 ;;Cashman, P.M., An overview of XCP: A system for supporting coordinated work
QuoteRef: casiRJ9_1983 ;;Casimir, R.J., Collection of variables
QuoteRef: castJ10_2012 ;;Castanos, J. et al., On the benefits and pitfalls of extending a statically typed language JIT compiler for dynamic scripting languages
QuoteRef: castM3_2008 ;;Castro, M. et al., Better bug reporting with better privacy
QuoteRef: cavaM8_2014 ;;Cavage, M., Pacheco, D., Bringing arbitrary compute to authoritative data
QuoteRef: cbb_1973 ;;Barber, C.B., from notebooks 1973-1979 [OK]
QuoteRef: cbb_1980 ;;Barber, C.B., from notebooks 1980-1989 [OK]
QuoteRef: cbb_1990 ;;Barber, C.B., from notebooks, 1990-1999 [OK]
QuoteRef: cbb_2000 ;;Barber, C.B., from notebooks, 2000-2009 [OK]
QuoteRef: celkJ7_1981 ;;Celko, J., Letter to the editor.
QuoteRef: cellW11_2008 ;;Cellary, W., Content communities on the Internet
QuoteRef: cercN11_1985 ;;Cercone, N. et al., An interactive system for finding perfect hash functions
QuoteRef: cerfVG12_2018 ;;Cerf, V.G., Self-authenticating identifiers
QuoteRef: cerfVG6_2021 ;;Cerf, V.G., It came from outer space! [NewQuotes]
QuoteRef: ceruPE3_1991 ;;Ceruzzi, P.E., When computers were human
QuoteRef: chaiGJ_1966 ;;Chaitin, G.J., On the length of programs for computing finite binary sequences
QuoteRef: chaiGJ_1970 ;;Chaitin, G.J., On the difficulty of computations
QuoteRef: chaiGJ5_1975 ;;Chaitin, G.J., Randomness and mathematical proof
QuoteRef: chaiGJ7_1975 ;;Chaitin, G.J., A theory of program size formally identical to information theory
QuoteRef: chaiGJ_1981 ;;Chaitin, G.J. et al., Register allocation via coloring
QuoteRef: chaiGJ6_1982 ;;Chaitin, G.J., Register allocation & spilling via graph coloring
QuoteRef: chaiGJ2_1986 ;;Chaitin, G.J., Register allocation and spilling via graph coloring
QuoteRef: chaiGJ_2001 ;;Chaitin, G.J., Exploring Randomness
QuoteRef: chakS8_1998 ;;Chakrabarti, S. et al., Mining the web's link structure
QuoteRef: chamB6_2016 ;;Chamith, B. et al., Living on the edge: rapid-toggling probes with cross-modification on x86
QuoteRef: chamB6_2017 ;;Chamith, B. et al., Instruction punning: lightweight instrumentation for x86-64
QuoteRef: chamC4_1995 ;;Chambers, C. et al., A framework for selective recompilation in the presence of complex intermodule dependencies
QuoteRef: chamDD_1971 ;;Chamberlin, D.D., The 'single-assignment' approach to parallel processing
QuoteRef: chamDD5_1974 ;;Chamberlin, D.D., Boyce, R.F., Sequel: a structured english query language
QuoteRef: chamS5_2016 ;;Chambi, S. et al., Better bitmap performance with Roaring bitmaps
QuoteRef: chanDW7_2007 ;;Chang, D.-W. et al., Kernel support for zero-loss Internet service restart
QuoteRef: chanE3_1978 ;;Chang, E. et al., Abstract data types in Euclid
QuoteRef: chanF6_2008 ;;Chang, F. et al., Bigtable: a distributed storage system for structured data
QuoteRef: chanJM_2000 ;;Chang, J.M., Daugherty, C.H., An efficient data structure for dynamic memory management
QuoteRef: chanKM7_1980 ;;Chandy, K.M., Misra, J., A simple model of distributed programs based on implementation-hiding and process autonomy
QuoteRef: chanRN_1974 ;;Chanon, R.N., On a measure of program structure
QuoteRef: chanSC7_1993 ;;Chang, S.C., Du, M.W., Diamond deque: a simple data structure for priority deques
QuoteRef: chanT8_2007 ;;Chandra, T. et al., Paxos made live -- An engineering perspective
QuoteRef: chanTM12_2016 ;;Chan, T.M., A simpler linear-time algorithm for intersecting two convex polyhedra in three dimensions
QuoteRef: chanYI9_1995 ;;Chang, Y.-I., Lee, C.-I., Climbing hashing for expandible files
QuoteRef: chanYI11_1999 ;;Chang, Y.-I. et al., Linear spiral hashing for expansible files
QuoteRef: chaoP1_2011 ;;Chaovalit, P. et al., Discrete wavelet transform-based time series analysis and mining
QuoteRef: chapA1_1965 ;;Chapanis, A., On the allocation of functions between men and machines
QuoteRef: chapA3_1973 ;;Chapanis, A., The communication of factual information through various channels
QuoteRef: chapA3_1975 ;;Chapanis, A., Interactive human communication
QuoteRef: chapA4_1977 ;;Chapanis, A. et al., Studies in interactive communication: II. The effects of four communication modes on the linguistic performance of teams during cooperative problem solving
QuoteRef: chapN10_1974 ;;Chapin, N., New format for flowcharts
QuoteRef: chapN5_1978 ;;Chapin, N., Denniston, S.P., Characteristics of a structured program
QuoteRef: chapPC8_2008 ;;Chapin, P.C. et al., Authorization in trust management: features and foundations
QuoteRef: charA5_2011 ;;Charland, A., Leroux, B., Mobile application development: web vs. native
QuoteRef: charD11_1987 ;;Charney, D., Comprehending non-linear text: The role of discourse cues and reading strategies
QuoteRef: charJ5_1997 ;;Charles, J., Snapshots from industry
QuoteRef: chauS1_2010 ;;Chaudhuri, S. et al., Continuity analysis of programs
QuoteRef: chavE9_2001 ;;Chavez, E. et al., Searching in metric spaces
QuoteRef: cheaAM9_2000 ;;Cheadle, A.M. et al., Non-stop Haskell
QuoteRef: cheaTE_1976 ;;Cheatham, T.E., Jr., Townley, J.A., A look at programming and programming systems
QuoteRef: cheaTE_1979 ;;Cheatham, T.E., Jr. et al., A system for program refinement
QuoteRef: checM3_2007 ;;Chechik, M. et al., Finding environmental guarantees
QuoteRef: chenH8_2002 ;;Chen, H. et al., Setuid demystified
QuoteRef: chenH5_2007 ;;Chen, H. et al., POLUS: A powerful live updating system
QuoteRef: chenH6_2020 ;;Chen, H. et al., A survey on Ethereum systems security: vulnerabilities, attacks, and defenses [NewQuotes]
QuoteRef: chenJ9_2008 ;;Cheney, J., FLUX: functional updates for XML
QuoteRef: chenJ2_2020 ;;Chen, J. et al., A survey of compiler testing [NewQuotes]
QuoteRef: chenJ5_2021 ;;Chen, J., He, F., Leveraging control flow knowledge in SMT solving of program verification [NewQuotes]
QuoteRef: chenJC7_2004 ;;Chen, J.-C., Building a new sort function for a C library
QuoteRef: chenMD_1957 ;;Chenu, M.-D., La Theologie au Douzieme Siecle [NewQuotes]
QuoteRef: chenPM9_1996 ;;Chen, P.M. et al., The Rio file cache: surviving operating system crashes
QuoteRef: chenPP3_1976 ;;Chen, P.P.-S., The entity-relationship model--toward a unified view of data
QuoteRef: chenPP_1977 ;;Chen, P.P., The entity-relationship model -- a basis for the enterprise view of data
QuoteRef: chenPP_1977b ;;Chen, P.P., The entity-relationship approach to logical data base design
QuoteRef: chenSK8_2001 ;;Chen, S.-K. et al., Reversible debugging using program instrumentation
QuoteRef: chenX3_2008 ;;Chen, X. et al., Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
QuoteRef: chenY5_2002 ;;Chen, Y., Signature files and signature trees
QuoteRef: chenY10_2002 ;;Chen, Y. et al., Oblivious hashing: A stealthy software integrity verification strategy
QuoteRef: chenY9_2015 ;;Chen, Y. et al., Deterministic replay: A survey
QuoteRef: cherC5_1988 ;;Cherniak, C., Undebuggability and cognitive science
QuoteRef: cherDR_1976 ;;Cheriton, D.R., Man-machine interface design for timesharing systems
QuoteRef: cherDR2_1979 ;;Cheriton, D.R. et al., Thoth, a portable real-time operating system
QuoteRef: cherDR4_1984 ;;Cheriton, D.R., The V kernel: A software base for distributed systems
QuoteRef: cherDR5_1986 ;;Cheriton, D.R., Problem-oriented shared memory: A decentralized approach to distributed system design
QuoteRef: cherDR3_1988 ;;Cheriton, D.R., The V distributed system
QuoteRef: cherDR12_1993 ;;Cheriton, D.R., Skeen, D., Understanding the limitations of causally and totally ordered communication
QuoteRef: cherS4_2020 ;;Cherubin, S., Agosta, G., Tools for reduced precision computation: a survey [NewQuotes]
QuoteRef: cherV7_1978 ;;Cherniavsky, V., Konrad, E., On limitations for algorithmic modeling or intelligent activities.
QuoteRef: chesS9_2010 ;;Chessin, S., Injecting errors for fun and profit
QuoteRef: chiL10_2016 ;;Chi, L., Zhu, X., Hashing techniques: a survey and taxonomy
QuoteRef: chieSY9_2001 ;;Chien, S.-Y. et al., Efficient management of multiversion documents by object referencing
QuoteRef: chilTM10_1998 ;;Chilimbi, T.M., Larus, J.R., Using generational garbage collection to implement cache- conscious data placement
QuoteRef: chilTM12_2000 ;;Chilimbi, T.M. et al., Making pointer-based data structures cache conscious
QuoteRef: chilTM10_2004 ;;Chilimbi, T.M., Hauswirth, M., Low-overhead memory leak detection using adaptive statistical profiling
QuoteRef: chilTM10_2006 ;;Chilimbi, T.,M., Ganapathy, V., HeapMD: Identifying heap-based bugs using anomaly detection
QuoteRef: chinRS3_1991 ;;Chin, R.S., Chanson, S.T., Distributed object-based programming systems
QuoteRef: chisD3_2015 ;;Chisnall, D. et al., Beyond the PDP-11: Architectural support for a memory-safe C abstract machine
QuoteRef: chisD7_2018 ;;Chisnall, D., C is not a low-level language
QuoteRef: chiuTC3_1999 ;;Chiueh, T.-C. et al., Intra-address space protection using segmentation hardware
QuoteRef: choCK_1987 ;;Cho, C.-K., Quality Programming. Developing and testing software with statistical quality control
QuoteRef: chocGV12_2001 ;;Chockler, G.V. et al., Group communication specifications: a comprehensive survey
QuoteRef: chomN9_1956 ;;Chomsky, N., Three models for the description of language
QuoteRef: chomN_1965 ;;Chomsky, N., Aspects of the theory of syntax
QuoteRef: chomN1_2005 ;;Chomsky, N., Three factors in language design
QuoteRef: chopS8_2010 ;;Chopra, S., Viewpoint: Rights for autonomous artificial agents?
QuoteRef: chouA11_2000 ;;Chou, A. et al., Using meta-level compilation to check FLASH protocol code
QuoteRef: chouY7_1985 ;;Choueka, Y., Lusignan, S., Disambiguation by short contexts
QuoteRef: chowFC10_1990 ;;Chow, F.C., Hennessy, J.L., The priority-based coloring approach to register allocation
QuoteRef: chowTS_1978 ;;Chow, T.S., Analysis of software design modeled by multiple finite state machines
QuoteRef: chriC8_1966 ;;Christensen, C., On the implementation of AMBIT, a language for symbol manipulation
QuoteRef: chriMH10_2008 ;;Christiansen, M.H., Chater, N., Language as shaped by the brain
QuoteRef: chriMH1_2016 ;;Christiasen, M.H., Chater, N., The now-or-never bottleneck: A fundamental constraint on language
QuoteRef: chriTW2_2002 ;;Christopher, T.W., What should be in a parallel library
QuoteRef: chunYC1_2000 ;;Chung, Y.C. et al., Reducing sweep time for a nearly empty heap
QuoteRef: churA_1936 ;;Church, A., An unsolvable problem of elementary number theory
QuoteRef: churA_1951 ;;Church, A., The need for abstract entities
QuoteRef: churK2_2014 ;;Church, K. et al., A large-scale study of daily information needs captured in situ
QuoteRef: churPM1_1990 ;;Churchland, P.M., Churchland, P.S., Could a machine think?
QuoteRef: ciacP4_1993 ;;Ciaccia, P., Zezula, P., Estimating accesses in partitioned signature file organizations
QuoteRef: ciapE1_1999 ;;Ciapessoni, E., et al, From formal methods to formally based methods: an industrial experience
QuoteRef: cinkMJ5_1991 ;;Cinkosky, M.J. et al., Electronic data publishing and GenBank
QuoteRef: cipoJ11_1982 ;;Cipolla, J., Computer implementation the utility of defining utility
QuoteRef: ciurMG9_2001 ;;Ciura, M.G., Deorowicz, S., How to squeeze a lexicon
QuoteRef: claeK9_2000 ;;Claessen, K., Hughes, J., QuickCheck: a lightweight tool for random testing of Haskell programs
QuoteRef: clanC1_2004 ;;Clanet, C. et al., Secrets of successful stone-skipping
QuoteRef: clanWJ1_1987 ;;Clancey, W.J., Review of Understanding Computers and Cognition
QuoteRef: clarBL9_1973 ;;Clark, B.L., Horning, J.J., Reflections on a language designed to write an operating system
QuoteRef: clarCL5_1997 ;;Clarke, C.L.A., Cormack, G.V., On the use of regular expressions for searching text
QuoteRef: clarDD8_1988 ;;Clark, D.D., The design philosophy of the DARPA Internet protocols
QuoteRef: clarDD12_1995 ;;Clark,D.D., The structuring of systems using upcalls
QuoteRef: clarDG10_1998 ;;Clarke, D.G. et al., Ownership types for flexible alias protection
QuoteRef: clarEM1_1979 ;;Clarke, E.M., Jr., Programming language constructs for which it is impossible to obtain good Hoare axiom systems
QuoteRef: clarEM11_2009 ;;Clarke, E.M. et al., Model checking: algorithmic verification and debugging
QuoteRef: clarIA_1978 ;;Clark, I.A., A second look at macros in command-driven systems
QuoteRef: clarKL9_1993 ;;Clarkson, K.L. et al., Four results on randomized incremental constructions [NewQuotes]
QuoteRef: clarLA8_1983 ;;Clarke, L.A., Richardson, D.J., The application of error-sensitive testing strategies to debugging
QuoteRef: clarS11_1999 ;;Clarke, S. et al., Subject-oriented design: towards improved alignment of requirements, design and code.
QuoteRef: clayR4_1978 ;;Clayton, R., letter to the editor
QuoteRef: cleaJC_1975 ;;Cleaveland, J.C., Meaning and syntactic redundancy
QuoteRef: cleaJC_1986 ;;Cleaveland, J.C., An introduction to data types
QuoteRef: cleaJG4_1984 ;;Cleary, J.G., Witten, I.H., Data compression using adaptive coding and partial string matching
QuoteRef: clebS10_2013 ;;Clebsch, S., Drossopoulou, S., Fully concurrent garbage collection of actors on many-core machines
QuoteRef: clemAT8_2017 ;;Clements, A. et al., The scalable commutativity rule: designing scalable software for multicore processors
QuoteRef: clevC4_1984 ;;Cleverdon, C., Optimizing convenient online access to bibliographic databases
QuoteRef: clicC3_1995 ;;Click, C., Cooper, K.D., Combining analyses, combining optimizations
QuoteRef: clifC9_1988 ;;Clifton, C. et al., The design of a document database
QuoteRef: clifC2_1989 ;;Clifton, C., Garcia-Molina, H., Indexing in a hypertext database
QuoteRef: clinWD6_1990 ;;Clinger, W.D., How to read floating point numbers accurately
QuoteRef: clouMJ7_1983 ;;Cloutier, M.J., Friedman, M.J., Precision averaging for real-time analysis
QuoteRef: coatA7_2009 ;;Coates, A. et al., Apprenticeship learning for helicopter control
QuoteRef: cobbRH11_1990 ;;Cobb, R.H., Mills, H.D., Engineering software under statistical quality control
QuoteRef: cochL_1994 ;;Cochrane, L., Adelard of Bath. The first English scientist [NewQuotes]
QuoteRef: cockA11_2002 ;;Cockburn, A. et al., Pushing back: evaluating a new behaviour for the back and forward buttons in web browsers
QuoteRef: cockA3_2008 ;;Cockburn, A., [Counterpoint] Subjective quality counts in software development
QuoteRef: cockJ4_1970 ;;Cocke, J., Schwartz, J.T., Programming languages and their compilers, Preliminary Notes
QuoteRef: coddEF6_1970 ;;Codd, E.F., A relational model of data for large shared data banks
QuoteRef: coddEF5_1971 ;;Codd, E.F., Further normalization of the data base relational model
QuoteRef: coddEF12_1979 ;;Codd, E.F., Extending the database relational model to capture more meaning
QuoteRef: coddEF2_1982 ;;Codd, E.F., Relational database: A practical foundation for productivity
QuoteRef: coddEF_1990 ;;Codd, E.F., The relational model for database management: version 2
QuoteRef: coeMD_1992 ;;Coe, M.D., Breaking the Maya Code
QuoteRef: coheD_2004 ;;Cohen-Steiner, D. et al., Conforming Delaunay triangulations in 3D
QuoteRef: coheJ1_1972 ;;Cohen, J. et al., A confirmation of the inertial-effect in sequential choice and decision
QuoteRef: coheJD7_1997 ;;Cohen, J.D., Recursive hashing functions for n-grams
QuoteRef: coheJD12_1998 ;;Cohen, J.D., An n-gram hash and skip algorithm for finding large numbers of keywords in continuous text streams
QuoteRef: coheNH10_1991 ;;Cohen, N.H., Technical correspondence: Type-extension type tests can be performed in constant time
QuoteRef: coheS4_1974 ;;Cohen, S., Speakeasy, an evolutionary system
QuoteRef: cokeR11_2004 ;;Coker, R., What is security-enhanced Linux?
QuoteRef: cokeZ5_2013 ;;Coker, Z., Hafiz, M., Program transformations to fix C integers
QuoteRef: colbKM12_1981 ;;Colby, K.M., Modeling a paranoid mind
QuoteRef: colbLS6_1989 ;;Colby, L.S., A recursive algebra and query optimization for nested relations
QuoteRef: coleHT_1817 ;;Colebrooke, H.T. (translator), Algebra, with Arithmetic and Mensuration, from the Sanscrit of Brahmegupta and Bhascara
QuoteRef: coleR10_1994 ;;Cole, R., Tight bounds on the complexity of the Boyer-Moore string matching algorithm
QuoteRef: coleR9_2002 ;;Cole, R., Hariharan, R., Approximate string matching: a simpler faster algorithm
QuoteRef: collC1_1999 ;;Collberg, C., Thomborson, C., Software watermarking: models and dynamic embeddings
QuoteRef: collGH11_1987 ;;Collier, G.H., Thoth-II: Hypertext with explicit semantics
QuoteRef: collJH8_1993 ;;Coll, J.H. et al., The blinking cursor: a two-experiment sequence investigating whether a blinking cursor facilitates user performance
QuoteRef: colwRP_2006 ;;Colwell, R.P., The Pentium Chronicles
QuoteRef: comeDE11_1986 ;;Comer, D.E., Peterson, L.L., Conversation-based mail
QuoteRef: comit_1961 ;;Research Lab. of Electronics and The Computation Center, COMIT, An introduction to COMIT programming
QuoteRef: compHU_1946 ;;The staff of the computation laboratory, A manual of operation for the automatic sequence controlled calculator
QuoteRef: conkJ9_1987 ;;Conklin, J., Hypertext: an introduction and survey
QuoteRef: conkJ11_1987 ;;Conklin, J., Begeman, M.L., gIBIS: A hypertext tool for team design deliberation
QuoteRef: conkJ12_1987 ;;Conklin, J., A survey of hypertext
QuoteRef: conrM5_1985 ;;Conrad, M., On design principles for a molecular computer
QuoteRef: controleng ;;no author, Control Engineering
QuoteRef: conwME7_1963 ;;Conway, M.E., Design of a separable transition-diagram compiler
QuoteRef: conwME11_1963 ;;Conway, M.E., A multiprocessor system design
QuoteRef: cookB1_2007 ;;Cook, B. et al., Proving that programs eventually do something good
QuoteRef: cookB5_2011 ;;Cook, B. et al., Proving program termination
QuoteRef: cookCR11_1980 ;;Cook, C.R., Kim, D.J., Best sorting algorithm for nearly sorted lists
QuoteRef: cookDE9_2009 ;;Cooke, D.E., Rushton, J.N., Taking Parnas's principles to the next level: declarative language design
QuoteRef: cookRP3_1982 ;;Cook, R.P., Donde, N., An experiment to improve operand addressing
QuoteRef: cookRP11_1986 ;;Cook, R.P., Modula-2 experiments will help future language designs
QuoteRef: cookWR5_1990 ;;Cook, W.R., Object-oriented programming versus abstract data types
QuoteRef: coonEE1_2010 ;;Coons, K.E. et al., GAMBIT: Effective unit testing for concurrency libraries
QuoteRef: coopKD_2001 ;;Cooper, K.D. et al., A simple, fast dominance algorithm
QuoteRef: coopKD9_2001 ;;Cooper, K.D. et al., Operator strength reduction
QuoteRef: coopN6_2007 ;;Cooprider, N., Regehr, J., Offline compression for on-chip RAM
QuoteRef: coopRG4_1982 ;;Cooper, R.G. Jr. et al., A human-factors case study based on the IBM personal computer
QuoteRef: copeBJ_1999 ;;Copeland, B.J., Furukawa, K., A lecture and two radio broadcasts on machine intelligence by Alan Turing
QuoteRef: copeBJ10_2000 ;;Copeland, B.J., Proudfoot, D., What Turing did after he invented the universal turing machine
QuoteRef: copeBJ_2017 ;;Copeland, B.J., Long, J., Turing and the history of computer music [NewQuotes]
QuoteRef: copeG3_1980 ;;Copeland, G., What if mass storage where free?
QuoteRef: copeGP5_1985 ;;Copeland, G.P., Khoshafian, S.N., A decomposition storage model
QuoteRef: copeN6_1524 ;;Copernici, Nicolai, Letter against Werner
QuoteRef: copeN_1535 ;;Copernici, Nicolai, Nicolai Copernici de hypothesibus motuum caelestium a se constitutus commentariolus
QuoteRef: copeN_1543 ;;Copernici, Nicolai, De revoluntionibus orbium caelestium
QuoteRef: coplJ11_1998 ;;Coplien, J. et al., Commonality and variability in software engineering
QuoteRef: corbFJ_1979 ;;Corbato, F.J., Clingen, C.T., A managerial view of the Multics system development
QuoteRef: corbJC3_1996 ;;Corbett, J.C., Evaluating deadlock detection methods for concurrent software
QuoteRef: cordD6_1991 ;;Cordes, D., Brown, M., The literate-programming paradigm
QuoteRef: cormG4_2005 ;;Cormode, G., Muthukrishnan, S., An improved data stream summary: the count-min sketch and its applications
QuoteRef: cormG1_2012 ;;Cormode, G., Muthukrishnan, S., Approximating data with the count-min sketch
QuoteRef: cormGV12_1987 ;;Cormack, G.V., Horspool, R.N.S., Data compression using dynamic markov modeling
QuoteRef: cormGV5_1988 ;;Cormack, G.V., A micro-kernel for concurrency in C
QuoteRef: cormGV8_2017 ;;Cormack, G.V., Grossman, M.R., Navigating imprecision in relevance assessments on the road to total recall: Roger and me [NewQuotes]
QuoteRef: cornD3_1994 ;;Corney, D., Gough, J., Type test elimination using typeflow analysis
QuoteRef: corrA5_2000 ;;Corral, A. et al., Closest pair queries in spatial databases
QuoteRef: corrH9_2015 ;;Corrigan-Gibbs, H. et al., Deterring cheating in online environments
QuoteRef: cortJW_1993 ;;Cortada, J.W., Before The Computer: IBM, NCR, Burroughs, and Remington Rand and the industry they created
QuoteRef: corwJ10_2003 ;;Corwin, J. et al., MJ: a rational module system for Java and its applications
QuoteRef: costAM7_1998 ;;Costello, A.M., Varghese, G., Redesigning the BSD timer facilities
QuoteRef: coucJ_1981 ;;Couch, J., Datagramming
QuoteRef: courPJ10_1971 ;;Courtois, P.J. et al., Concurrent control with "readers" and "writers"
QuoteRef: cousP1_2004 ;;Cousot, P., Cousot, R., An abstract interpretation-based framework for software watermarking
QuoteRef: coxBJ1_1983 ;;Cox, B.J., The object oriented pre-compiler
QuoteRef: coxBJ7_1983 ;;Cox, B.J., The message/object programming model: A small change, at a deep conceptual level
QuoteRef: coxR8_2002 ;;Cox, R. et al., Security in Plan 9
QuoteRef: coxR3_2008 ;;Cox, R. et al., Xoc, an extension-oriented compiler for systems programming
QuoteRef: craiJJ4_1987 ;;Craig, J.J., Coordinated motion of industrial robots and 2-DOF orienting tables
QuoteRef: craiKJW_1952 ;;Craik, K.J.W., The Nature of Explanation [NewQuotes]
QuoteRef: cranK11_2017 ;;Crane, K. et al., The heat method of distance computation
QuoteRef: crarK1_2015 ;;Crary, K., Sullivan, M.J., A calculus for relaxed memory
QuoteRef: crawH11_2008 ;;Crawford, H., Aycock, J., Kwyjibo: automatic domain name generation
QuoteRef: creaRP_1986 ;;Crease, R.P., Mann, C.C., The Second Creation
QuoteRef: creeC11_1997 ;;Creel, C. et al., The opportunity of a millennium
QuoteRef: crocM_1994 ;;Crochemore, M., Rytter, W., Text algorithms
QuoteRef: crocM10_1994 ;;Crochemore, M. et al., Speeding up two string-matching algorithms
QuoteRef: crocM7_1999 ;;Crochemore, M. et al., Text compression using antidictionaries
QuoteRef: crocM12_2001 ;;Crochemore, M. et al., A fast and practical bit-vector algorithm for the longest common subsequence problem
QuoteRef: crocSD10_2019 ;;Crocker, S.D., The Arpanet and its impact on the state of networking [NewQuotes]
QuoteRef: crosN_1977 ;;Cross, N., The Automated Architect
QuoteRef: crusMR6_2022 ;;Crusoe, M.R. et al., Methods included [NewQuotes]
QuoteRef: cullDE11_1996 ;;Culler, D.E. et al., A practical model of parallel computation
QuoteRef: culpJS12_2010 ;;Culpepper, J.S., Moffat, A., Efficient set intersection for inverted indexing
QuoteRef: culpR7_2010 ;;Culpepper, R., Felleisen, M., Debugging hygienic macros
QuoteRef: currG11_1986 ;;Curry, G., An approach to type safety in a traits system
QuoteRef: currHB7_1929 ;;Curry, H.B., An analysis of logical substitution [ExtraQuote]
QuoteRef: curtB2_1989 ;;Curtis, B. et al., Experimental evaluation of software documentation formats
QuoteRef: curtC6_2018 ;;Curtsinger, C., Berger, E.D., Coz: finding code that counts with causal profiling
QuoteRef: cusaN_1440 ;;Cusa, Nicholas of, De Docta Ignorantia
QuoteRef: cusuMA6_1997 ;;Cusumano, M.A., Selby, R.W., How Microsoft builds software
QuoteRef: cusuMA10_1999 ;;Cusumano, M.A., Yoffie, D.B., Software development on internet time
QuoteRef: cusuMA1_2021 ;;Cusumano, M.A., Boeing's 737 Max: A failure of management, not just technology [NewQuotes]
QuoteRef: cutcI9_2008 ;;Cutcutache, I., Wong, W.-F., Fast, frequency-based, integrated register allocation and instruction scheduling
QuoteRef: cutlA_2012 ;;Cutler, A., Native Listening. Language Experience and the Recognition of Spoken Words [NewQuotes]
QuoteRef: cwalK_2006 ;;Cwalina, K., Abrams, B., Framework Design Guidelines: Conventions, Idioms, and patterns for reusable .NET libraries
QuoteRef: cyphA4_1991 ;;Cypher, A., Eager: programming repetitive tasks by example
QuoteRef: cytrR10_1991 ;;Cytron, R. et al., Efficiently computing static single assignment form and the control dependence graph
QuoteRef: dacrMF1_2021 ;;Dacrema, M.F. et al., A troubling analysis of reproducibility and progress in recommender systems research [NewQuotes]
QuoteRef: dahlOJ9_1966 ;;Dahl, O.-J., Nygaard, K., SIMULA, an Algol based simulation language
QuoteRef: dahlOJ_1967 ;;Dahl, O.-J., Nygaard, K., Class and subclass declarations
QuoteRef: dahlOJ_1972 ;;Dahl, O.J. et al., Structured Programming
QuoteRef: dahlOJ_1972a ;;Dahl, O.-J., Hoare, C.A.R., Hierarchical program structures
QuoteRef: daiL4_2009 ;;Dai, L. et al., Shifting the focus from accuracy to recallability: a study of informal note-taking on mobile information technologies
QuoteRef: daiuC_1981 ;;Daiute, C., Taylor, R., Computers and the improvement of writing
QuoteRef: daleRC11_1965 ;;Daley, R.C., Neumann, P.G., A general-purpose file system for secondary storage
QuoteRef: daleRC5_1968 ;;Daley, R.C., Dennis, J.B., Virtual memory, processes, and sharing in MULTICS
QuoteRef: dallR1_1982 ;;Dallimonti, R., Challenge for the 80s: Making man-machine interfaces more effective
QuoteRef: daloB11_2016 ;;Daloze, B. et al., Efficient and thread-safe objects for dynamically-typed languages [NewQuotes]
QuoteRef: damA9_1971 ;;van Dam, A., Rice, D.E., On-line text editing: a survey
QuoteRef: damA7_1988 ;;van Dam, A., Hypertext '87 keynote address
QuoteRef: damaL1_1982 ;;Dama, L., Milner, R., Principal type-schemes for functional programs
QuoteRef: dameF3_1964 ;;Damerau, F., A technique for computer detection and correction of spelling errors
QuoteRef: dantA6_2017 ;;d'Antras, A. et al., Low overhead dynamic binary translation on ARM
QuoteRef: dantL5_2021 ;;D'Antoni, L., Veanes, M., Automata modulo theories [NewQuotes]
QuoteRef: dantT_1954 ;;Dantzig, T., Number, the language of science; a critical survey written for the cultured non-mathematician
QuoteRef: dargPT10_2006 ;;Darga, P.T., Boyapati, C., Efficient software model checking of data structure properties
QuoteRef: darkRP10_1997 ;;Darken, R.P. et al., The omni-directional treadmill: a locomotion device for virtual worlds
QuoteRef: darrJJ3_1993 ;;Darragh, J.J. et al., Bonsai: A compact representation of trees
QuoteRef: daruE3_2017 ;;Darulova, E., Kuncak, V., Towards a compiler for reals [NewQuotes]
QuoteRef: darwC_1859 ;;Darwin, C., On the Origin of Species by Means of Natural Selection [OK]
QuoteRef: dasM6_2000 ;;Das, M., Unification-based pointer analysis with directional assignments
QuoteRef: daskC2_2009 ;;Daskalakis, C. et al., The complexity of computing a Nash equilibrium
QuoteRef: dateCJ_1998 ;;Date, C.J., Darwen, H., Foundation of Object/Relational Databases: The third manifesto
QuoteRef: dattB_1935 ;;Datta, B., Singh, A.N., History of Hindu Mathematics: a source book, part 1, numeral notation and arithmetic
QuoteRef: dattRT1_1979 ;;Dattola, R.T., FIRST: flexible information retrieval system for text
QuoteRef: dautN3_2015 ;;Dautenhahn, N. et al., Nested kernel: An operating system architecture for intra-kernel privilege separation
QuoteRef: daviA7_2006 ;;Davis, A., First virus? [Letter to the editor]
QuoteRef: daviAL_1979 ;;Davis, A.L., A data flow evaluation system based on the concept of recursive locality
QuoteRef: daviB6_2003 ;;Davis, B. et al., The case for virtual register machines
QuoteRef: daviD_1967 ;;Davidson, D., Truth and meaning
QuoteRef: daviD_1968 ;;Davidson, D., On saying that
QuoteRef: daviD11_1974 ;;Davidson, D., On the very idea of a conceptual schema
QuoteRef: daviD6_1995 ;;Davis, D., Kerberos security with clocks adrift
QuoteRef: daviDW_2004 ;;Davies, D.W., Corrections to Turing's universal computing machine [NewQuotes]
QuoteRef: daviFM_2006 ;;David, F.M. et al., Exception handling in the Choices operating system
QuoteRef: daviG6_1986 ;;Davies, G., Bowsher, S., Algorithms for pattern matching
QuoteRef: daviIJ12_1992 ;;Davis, I.J, A fast radix sort
QuoteRef: daviJW6_1987 ;;Davidson, J.W., Vaughan, R.A., The effect of instruction set complexity on program size and memory performance
QuoteRef: daviJW11_1987 ;;Davidson, J.W., Fraser, C.W., Automatic inference and fast interpretation of peephole optimization rules
QuoteRef: daviL_1505 ;;da Vinci, L., Treatise on the Flight of Birds
QuoteRef: daviM7_1982 ;;Davis, M., Why Godel didn't have Church's thesis
QuoteRef: daviM_2000 ;;Davis, M., The Universal Computer. The Road from Leibniz to Turing
QuoteRef: daviMD_1981 ;;Davis, M.D., Weyuker, E.J., Pseudo-oracles for non-testable programs
QuoteRef: daviNR2_1974 ;;Davies, N.R., Decision tables in discrete system simulation
QuoteRef: daviPJ3_1972 ;;Davis, P.J., Fidelity in mathematical discourse: Is one and one really two?
QuoteRef: daviPJ_1981 ;;Davis, P.J., Hersh, R., The Mathematical Experience
QuoteRef: daviRI10_2011 ;;Davis, R.I., Burns, A., A survey of hard real-time scheduling for multiprocessor systems
QuoteRef: daviSB9_1985 ;;Davidson, S.B. et al., Consistency in a partitioned network: a survey
QuoteRef: daviT3_2015 ;;David, T. et al., Asynchronized concurrency: The secret to scaling concurrent search data structures
QuoteRef: daviY6_2016 ;;David, Y. et al., Statistical similarity of binaries
QuoteRef: daviY6_2017 ;;David, Y. et al., Similarity of binaries through re-optimization
QuoteRef: davoA4_2018 ;;Davoudian, A. et al., A survey of NoSQL stores
QuoteRef: dawsR11_1997 ;;Dawson, R., Newsham, R., Introducing software engineering to the real world
QuoteRef: deanD5_1996 ;;Dean, D. et al., Java security: from HotJava to Netscape and beyond
QuoteRef: deanJ1_2008 ;;Dean, J., Ghemawat, S., MapReduce: Simplified data processing on large clusters
QuoteRef: dearA4_1993 ;;Dearle, A. et al., Using persistence to support incremental system construction
QuoteRef: debaEH_1990 ;;Debaere, E.H., Van Campenhout, J.M., Interpretation and Instruction Path Coprocessing
QuoteRef: debrS1_1998 ;;Debray, S. et al., Alias analysis of executable code
QuoteRef: debrSK3_2000 ;;Debray, S.K., Evans, W., Compiler techniques for code compaction
QuoteRef: decaG10_2007 ;;DeCandia, G. et al., Dynamo: Amazon's highly available key-value store
QuoteRef: decaG6_2019 ;;Decaroli, G. et al., A compact index for order-preserving pattern matching [NewQuotes]
QuoteRef: dedeCJ1_1988 ;;Dede, C.J. et al., Factors shaping the evolution of electronic documentation systems
QuoteRef: dedeR_1888 ;;Dedekind, R., Was sind und was solled die Zahlen?
QuoteRef: dedeR2_1890 ;;Dedekind, R., Letter to Keferstein
QuoteRef: defoDC6_2005 ;;Defoe, D.C. et al., Upper bound for defragmenting buddy heaps
QuoteRef: defrJF6_2022 ;;DeFranco, J.F., Voes, J., Revisting software metrology [NewQuotes]
QuoteRef: degaP6_2001 ;;Degano, P., Priami, C., Enhanced operational semantics: a tool for describing and analyzing concurrent systems
QuoteRef: dehnJC4_1998 ;;Dehnert, J.C., Stepanov, A., Fundamentals of generic programming
QuoteRef: deliC4_2017 ;;Delimitrou, C., Kozyrakis, C., Bolt: I know what you did last summer... in the cloud
QuoteRef: deliDC6_2011 ;;D'Elia, D.C. et al., Mining hot calling contexts in small space
QuoteRef: deliNM5_1984 ;;Delisle, N.M. et al., Viewing a programming environment as a single tool
QuoteRef: deliR6_2001 ;;DeLine, R., Fahndrich, M., Enforcing high-level protocols in low-level software
QuoteRef: deliR8_2010 ;;Deline, R. et al., Software development with code maps
QuoteRef: deloC10_2013 ;;DeLozier, C. et al., Ironclass C++: A library-augmented type-safe subset of C++
QuoteRef: demaE7_2001 ;;Demaine, E., Fast and small resizable arrays
QuoteRef: demaT3_1984 ;;DeMarco, T., Soceneantu, A., SYNCRO: A dataflow command shell for the Lilith/Modula computer
QuoteRef: demaT5_1989 ;;DeMarco, T., Lister, T., Software development: state of the art vs. state of the practice
QuoteRef: demeA_1978 ;;Demers, A. et al., Data types as values: polymorphism, type-checking, encapsulation
QuoteRef: demeA3_1979 ;;Demers, A., Donahue, J., Report on the programming language Russell
QuoteRef: demeA_1980 ;;Demers, A., Donahue, J., Type-Completeness: as a language principle
QuoteRef: demeA7_1985 ;;Demers, A. et al., Attribute propagation by message passing
QuoteRef: demeA8_1987 ;;Demers, A. et al., Epidemic algorithms for replicated database maintenance
QuoteRef: demeA4_1995 ;;Demers, A. et al., The Bayou architecture: support for data sharing among mobile users
QuoteRef: demeAJ_1980 ;;Demers, A.J., Donahue, J.E., Data Types, parameters and type checking
QuoteRef: demeR5_2008 ;;Dementiev, R. et al., STXXL: standard template library for XXL data sets
QuoteRef: demiRA_1977 ;;DeMillo, R.A. et al., Social processes and proofs of theorems and programs
QuoteRef: demiRA5_1979 ;;DeMillo, R.A. et al., Social processes and proofs of theorems and programs
QuoteRef: demo_430 ;;Democritus, Leucippus, Fragments
QuoteRef: demoA_1847 ;;De Morgan, A., Formal Logic: or, The Calculus of Inference, Neceffary and Probable.
QuoteRef: demoA_1864 ;;De Morgan, A., On the syllogism, No. III and On logic in general [OK]
QuoteRef: demsB10_2003 ;;Demsky, B., Rinard, M., Automatic detection and repair of errors in data structures
QuoteRef: demsB2_2013 ;;Demsky, B., Lam, P., Views: Synthesizing fine-grained concurrency control
QuoteRef: dennDC_1978 ;;Dennett, D.C., Dennett, D.C., Skinner skinned
QuoteRef: dennDC_1978a ;;Dennett, D.C., Artificial intelligence as philosophy and as psychology
QuoteRef: dennDE5_1976 ;;Denning, D.E., A lattice model of secure information flow
QuoteRef: dennDE8_1981 ;;Denning, D.E., Sacco, G.M., Timestamps in key distribution protocols
QuoteRef: dennDE2_1983 ;;Denning, D.E., Protecting public keys and signature keys
QuoteRef: dennDE4_1984 ;;Denning, D.E., Digital signatures with RSA and other public-key cryptosystems
QuoteRef: dennJB10_1965 ;;Dennis, J.B., Segmentation and the design of multiprogrammed computer systems
QuoteRef: dennJB3_1966 ;;Dennis, J.B., Van Horn, E.C., Programming semantics for multiprogrammed computations
QuoteRef: dennJB_1974 ;;Dennis, J.B., First version of a data flow procedure language
QuoteRef: dennPJ_1978 ;;Denning, P.J., Working sets today
QuoteRef: dennPJ_1980 ;;Denning, P.J. et al., Operating systems
QuoteRef: dennPJ1_1980 ;;Denning, P.J., Working sets past and present
QuoteRef: dennPJ9_1980 ;;Denning, P.J., On learning how to predict
QuoteRef: dennPJ3_1982 ;;Denning, P.J., Electronic Junk
QuoteRef: dennPJ3_1995 ;;Denning, P.J., Can there be a science of information?
QuoteRef: dennPJ11_2007 ;;Denning, P.J., The choice uncertainty principle
QuoteRef: dennPJ3_2009 ;;Denning, P.J., Riehle, R.D., The profession of IT: Is software engineering engineering?
QuoteRef: dennPJ2_2021 ;;Denning, P.J., Working set analytics [NewQuotes]
QuoteRef: deorS11_2000 ;;Deorowicz, S., Improvements to Burrows-Wheeler compression algorithm
QuoteRef: dereF8_1979 ;;DeRemer, F., Pennello, T.J., Efficient computation of LALR(1) look-ahead sets
QuoteRef: dereF3_2001 ;;Derepas, F. et al., Avoiding state explosion for distributed systems with timestamps
QuoteRef: dereFL6_1975 ;;DeRemer, F.L., Kron, H., Programming-in-the-small versus programming-in-the-large
QuoteRef: deroSJ2_1990 ;;DeRose, S.J. et al., What is text, really?
QuoteRef: dersN5_2021 ;;Dershowitz, N., Viewpoint: Let's be honest [NewQuotes]
QuoteRef: desaA6_2013 ;;Desai, A. et al., P: Safe asynchronous event-driven programming
QuoteRef: desaA10_2014 ;;Desai, A. et al., Natural proofs for asynchronous programs using almost-synchronous reductions
QuoteRef: desaC_2014 ;;Desan, C., Making Money. Coin, Currency, and the Coming of Capitalism
QuoteRef: desbN2_2012 ;;Desnoyers, M. et al., User-level implementations of read-copy update
QuoteRef: descR_1637 ;;Descartes, R., Discourse on the Method for Rightly Conducting One's Reason and for Seeking Truth in the Sciences
QuoteRef: descR_1641 ;;Descartes, R., Meditations on First Philosophy in which the existence of God and the distinction of the soul from the body are demonstrated
QuoteRef: descR_1641a ;;Descartes, R., Geometry
QuoteRef: desnM7_2013 ;;Desnoyers, M., Proving the correctness of nonblocking data structures
QuoteRef: detlDL12_2002 ;;Detlefs, D.L. et al., Lock-free reference counting
QuoteRef: deutLP1_1981 ;;Deutsch, L.P., Constraints: a uniform model for data and control
QuoteRef: deutLP8_1981 ;;Deutsch, L.P., Building control structures in the Smalltalk-80 system
QuoteRef: deviJ3_2009 ;;Devietti, J. et al., DMP: Deterministic shared memory multiprocessing
QuoteRef: deviO6_1999 ;;Devillers, O., On deletion in Delaunay triangulations
QuoteRef: deviO4_2001 ;;Devillers, O., Teillaud, M., Perturbations for Delaunay and weighted Delaunay 3D triangulations [NewQuotes]
QuoteRef: dewaRB10_1969 ;;Dewar, R.B.K. et al., The Iltran programming language
QuoteRef: dewaRB6_1975 ;;Dewar, R.B.K., Indirect threaded code
QuoteRef: dewaRB1_1977 ;;Dewar, R.B.K., McCann, A.P., Macro Spitbol--a Snobol4 compiler
QuoteRef: dewhSC_2005 ;;Dewhurst, S.C., C++ common knowledge: essential intermediate programming
QuoteRef: dewiDJ_1982 ;;DeWitt D.J., Friedland D., Exploiting parallelism for the performance enhancement of non-numeric applications
QuoteRef: deyTK6_1991 ;;Dey, T.K. et al., On good triangulations in three dimensions
QuoteRef: dhirS2_2020 ;;Dhir, S., Devi, S.K.A., The use of biometric fingerprints for on-the-fly digital signing of documents [NewQuotes]
QuoteRef: dhurD6_2003 ;;Dhurjati, D. et al., Memory safety without runtime checks or garbage collection
QuoteRef: dhurD5_2006 ;;Dhurjati, D., Adve, V., Backwards-compatible array bounds checking for C with very low overhead
QuoteRef: dhurD6_2006 ;;Dhurjati, D. et al., SAFECode: enforcing alias analysis for weakly typed languages
QuoteRef: diasJ1_2010 ;;Dias, J., Ramsey, N., Automatically generating instruction selectors using declarative machine descriptions
QuoteRef: diceD2_2003 ;;Dice, D., Garthwaite, A., Mostly lock-free malloc
QuoteRef: dickGW1_1986 ;;Dickson, G.W. et al., Understanding the effectiveness of computer graphics for decision support: A cumulative experimental approach
QuoteRef: dickTE7_1981 ;;Dickey, T.E., Programmer variability
QuoteRef: diesSM11_2010 ;;Diesburg, S.M., Wang, A.-I. .A., A survey of confidential data storage and deletion methods
QuoteRef: dietW6_2012 ;;Dietz, W. et al., Understanding integer overflow in C/C++
QuoteRef: dietW11_2018 ;;Dietz, W., Adve, V., Software multiplexing: Share your libraries and statically link them too [NewQuotes]
QuoteRef: digD5_2007 ;;Dig, D. et al., Refactoring-aware configuration management for object-oriented programs
QuoteRef: dijkEJ_1955 ;;Dijksterhaus, E.J., General introduction
QuoteRef: dijkEW_1963 ;;Dijkstra, E.W., On the design of machine independent programming languages
QuoteRef: dijkEW5_1965 ;;Dijkstra, E.W., Programming considered as a human activity
QuoteRef: dijkEW9_1965 ;;Dijkstra, E.W., Solution of a problem in concurrent programming control
QuoteRef: dijkEW3_1968 ;;Dijkstra, E.W., Goto statement considered harmful
QuoteRef: dijkEW10_1969 ;;Dijkstra, E.W., Structured Programming
QuoteRef: dijkEW3_1970 ;;Dijkstra, E.W. et al., News item--minority report [to Report on the algorithmic language ALGOL 68]
QuoteRef: dijkEW2_1971 ;;Dijkstra, E.W., Hierarchical ordering of sequential processes
QuoteRef: dijkEW_1972 ;;Dijkstra, E.W., Notes on structured programming
QuoteRef: dijkEW10_1972 ;;Dijkstra, E.W., The humble programmer
QuoteRef: dijkEW11_1974 ;;Dijkstra, E.W., Self-stabilizing systems in spite of distributed control
QuoteRef: dijkEW_1976 ;;Dijkstra, E.W., Formal techniques and sizeable programs
QuoteRef: dijkEW_1976a ;;Dijkstra, E.W., Programming methodologies: Their objectives and their nature
QuoteRef: dijkEW3_1976 ;;Dijkstra, E.W., Dijkstra, E.W., EWD554 A Personal summary of the Gries-Owicki theory
QuoteRef: dijkEW_1977 ;;Dijkstra, E.W., Guarded commands, nondeterminacy and formal derivation of programs
QuoteRef: dijkEW_1979 ;;Dijkstra, E.W., My hopes of computer science
QuoteRef: dijkEW_1982 ;;Dijkstra, E.W., Dijkstra, E.W., EWD648 "Why is software so expensive?" An explanation to the hardware designer
QuoteRef: dijkEW12_1989 ;;Dijkstra, E.W., A debate on teaching computing science: On the cruelty of really teaching computing science
QuoteRef: dillDL4_1996 ;;Dill, D.L., Rushby, J., Acceptance of formal methods: lessons from hardware design
QuoteRef: dillI6_2007 ;;Dillig, I. et al., Static error detection using semantic inconsistency inference
QuoteRef: dillI6_2008 ;;Dillig, I. et al., Sound, complete and scalable path-sensitive analysis
QuoteRef: dillPC4_2004 ;;Dillinger, P.C., Manolios, P., Fast and accurate bitstate verification for SPIN
QuoteRef: dimoC9_2016 ;;Dimoulas, C. et al., Oh lord, please don't let contracts be misunderstood (Functional Pearl) [NewQuotes]
QuoteRef: dimoT9_1986 ;;Dimock, T., letter to the editor
QuoteRef: dineF7_2013 ;;de Dinechin, F. et al., On Ziv's rounding test
QuoteRef: dingC5_1999 ;;Ding, C., Kennedy, K., Improving cache performance in dynamic applications through data and computation reorganization at run time
QuoteRef: dingX2_2011 ;;Ding, X. et al., ULCC: A user-level facility for optimizing shared cache performance on multicores
QuoteRef: dingYZ3_2002 ;;Ding, Y.Z., Rabin M.O., Hyper-encryption and everlasting security
QuoteRef: diniJ_2010 ;;Dinis, J., Mamede, M., Sweeping the sphere
QuoteRef: diop_250 ;;Diophantus, The Arithmetica [NewQuotes]
QuoteRef: diseAA_1986 ;;diSessa, A.A., Notes on the future of programming: breaking the utility barrier
QuoteRef: diseAA_1986a ;;diSessa, A.A., Models of computation
QuoteRef: diseAA9_1986 ;;diSessa, A.A., Abelson, H., Boxer: A reconstructible computational medium
QuoteRef: ditzDR3_1982 ;;Ditzel, D.R., McLellan, H.R., Register allocation for free: The C machine stack cache.
QuoteRef: dobsJ4_1989 ;;Dobson, J., Randell, B., Program verification: Public image and private reality
QuoteRef: dod12_1977 ;;no author, Department of Defense requirements for high order computer programming languages
QuoteRef: doddM1_2015 ;;Dodds, M. et al., A scalable, correct time-stamped stack
QuoteRef: doheJ10_2011 ;;Doherty, J. et al., Kind analysis for MATLAB
QuoteRef: dolaS6_2018 ;;Dolan, S. et al., Bounding data races in space and time [NewQuotes]
QuoteRef: dolbJ10_1998 ;;Dolby, J., Chien, A.A., An evaluation of automatic object inline allocation techniques
QuoteRef: dolbJ6_2000 ;;Dolby, J., Chien, A.A., An automatic object inlining optimization and its evaluation
QuoteRef: doloTA_1976 ;;Dolotta, T.A. et al., The LEAP load and test driver
QuoteRef: doloTA7_1978 ;;Dolotta, T.A. et al., UNIX time-sharing system: The programmer's workbench
QuoteRef: domiP10_2012 ;;Domingos, P., A few useful things to know about machine learning
QuoteRef: dompS5_1975 ;;Dompier, S., Music of a sort
QuoteRef: donaJ7_1985 ;;Donahue, J., Demers, A., Data types as values
QuoteRef: donaJ7_1985a ;;Donahue, J., Integration mechanisms in Cedar
QuoteRef: dongJJ5_1987 ;;Dongarra, J.J., Grosse, E., Distribution of mathematical software via electronic mail
QuoteRef: donnMD_1987 ;;Donner, M.D., Real-Time Control of Walking
QuoteRef: dorN6_2003 ;;Dor, N. et al., CSSV: towards a realistic tool for statically detecting all buffer overflows in C
QuoteRef: dorwSM1_1997 ;;Dorward, S.M. et al., The Inferno operating system
QuoteRef: dosrG1_2006 ;;Dos Reis, G., Stroustrup, B., Specifying C++ concepts
QuoteRef: dossR9_2014 ;;Doss, R., Using goto statements
QuoteRef: dostLE_1963 ;;Dostert, L.E., Machine translation and automatic language data processing
QuoteRef: douW3_2017 ;;Dou, W. et al., CACheck: detecting and repairing cell arrays in spreadsheets [NewQuotes]
QuoteRef: doucJR5_1999 ;;Douceur, J.R., Bolosky, W.J., A large-scale study of file-system contents
QuoteRef: dourP6_1999 ;;Dourish, P. et al., Presto: an experimental architecture for fluid interactive document spaces
QuoteRef: dowSP12_2010 ;;Dow, S.P. et al., Parallel prototyping leads to better design results, more divergence, and increased self-efficacy
QuoteRef: drakS5_1973 ;;Drake, S., Galileo's discovery of the law of free fall
QuoteRef: drakS_1978 ;;Drake, S., Galileo at work, his scientific biography
QuoteRef: drakS_1980 ;;Drake, S., Galileo, A Very Short Introduction
QuoteRef: drapSW_1986 ;;Draper, S.W., Display managers as the basis for user-machine communication
QuoteRef: drecRL5_2007 ;;Drechsler, R.L., Mocenigo, J.M., The Yoix scripting language: a different way of writing Java applications
QuoteRef: drepU12_2011 ;;Drepper, U., How to write shared libraries
QuoteRef: drexKE_1986 ;;Drexler, K.E., Engines of Creation
QuoteRef: drexKE12_1987 ;;Drexler, K.E., Hypertext publishing and the evolution of knowledge
QuoteRef: dreyHL_1979 ;;Dreyfus, H.L., What Computers Can't Do: The limits of artificial intelligence
QuoteRef: dreyHL_1991 ;;Dreyfus, H.L., Rubin, J. [Appendix, p. 282-340], Being-in-the-World: A commentary on Heidegger's Being and Time
QuoteRef: dreyHL1_1994 ;;Dreyfus, H.L., What computers still can't do
QuoteRef: drieK_2001 ;;Driesen, K., Efficient Polymorphic Calls
QuoteRef: drisJR5_1986 ;;Driscoll, J.R. et al., Making data structures persistent
QuoteRef: drizL7_1993 ;;Drizis, L., A method for fast tape backups and restores
QuoteRef: drosI4_1971 ;;Drost-Fromm, I., Tompkins, R., Open source community governance the Apache way [NewQuotes]
QuoteRef: drosS10_1998 ;;Drossopoulou, S. et al., What is binary compatibility?
QuoteRef: drucPF_1946 ;;Drucker, P.F., Concept of the Corporation
QuoteRef: drucPF1_1958 ;;Drucker, P.F., Marketing and economic development
QuoteRef: drucPF_1974 ;;Drucker, P.F., Management: tasks responsibilities practices
QuoteRef: druiA3_1997 ;;Druin, A. et al., KidPad: A design collaboration between children, technologists, and educators
QuoteRef: druiA4_1997 ;;Druin, A., Why do we make technology for kids?
QuoteRef: drumH3_1998 ;;Drummond, H., Riding a tiger: some lessons of Taurus
QuoteRef: duMW8_1994 ;;Du, M.-W., Chang, S.C., An approach to designing very fast approximate string matching algorithms
QuoteRef: dubaC6_2012 ;;Dubach, C. et al., Compiling a high-level language for GPUs
QuoteRef: duboK10_2013 ;;Du Bois, K. et al., Bottle graphs: Visualizing scalability bottlenecks in multi-threaded applications
QuoteRef: dubrV3_2004 ;;Dubrovsky, V., Toward system principles: General system theory and the alternative approach [NewQuotes]
QuoteRef: dubyJJ12_1971 ;;Duby, J.J., Extensible language: A potential user's point of view
QuoteRef: duccR10_2008 ;;Duccournau, R., Perfect hashing as an almost perfect subtype test
QuoteRef: duckGJ6_2018 ;;Duck, G.J., Yap, R.H.C., EffectiveSan: type and memory error detection using dynamically typed C/C++ [NewQuotes]
QuoteRef: ducoR10_2008 ;;Ducournau, R., Perfect hashing as an almost perfect subtype test
QuoteRef: ducoR10_2009 ;;Ducournau, R. et al., Empirical assessment of object-oriented implementations with multiple inheritance and static typing
QuoteRef: ducoR4_2011 ;;Ducournau, R., Implementing statically typed object-oriented programming languages
QuoteRef: ducoR5_2011 ;;Ducournau, R., Coloring, a versatile technique for implementing object-oriented languages
QuoteRef: ducoR5_2011a ;;Ducournau, R., Morandat, F., Perfect class hashing and numbering for object-oriented implementation
QuoteRef: duffT3_2008 ;;Duff, T., A conversation with Kurt Akeley and Pat Hanrahan
QuoteRef: duggD9_2001 ;;Duggan, D., Type-based hot swapping of running modules
QuoteRef: duheP_1913 ;;Duhem, P., Le Systeme du monde: Histoire des doctrines cosmologiques de Platon a Copernic
QuoteRef: dujaE1_1998 ;;Dujardin, E. et al., Fast algorithms for compressed multimethod dispatch table generation
QuoteRef: dumaJ6_1995 ;;Dumas, J., Parsons, P., Discovering the way programmers think about new programming environments
QuoteRef: dumaS12_2015 ;;Dumais, S. et al., Stuff I've seen: a system for personal information retrieval and re-use
QuoteRef: dummM_1967 ;;Dummett, M.,, Frege, Gottlob
QuoteRef: dunbRIM_1996 ;;Dunbar, R. I. M., Grooming, gossip, and the evolution of language [NewQuotes]
QuoteRef: duns12_1970 ;;Dun & Bradstreet, The financial key at ITT
QuoteRef: duraM9_2003 ;;Durand, M., Flajolet, P., Loglog counting of large cardinalities
QuoteRef: dutiC_2012 ;;Dutilh Novaes, C., Formal Languages in Logic. A philosophical and cognitive analysis [NewQuotes]
QuoteRef: duttG9_1993 ;;Dutton, G., Usability testing emerges as new benchmark
QuoteRef: duvaVJ9_1997 ;;Duvanenko, V.J., Two writes make a read
QuoteRef: dvorJC9_1988 ;;Dvorak, J.C., New age villainy
QuoteRef: dvorJC9_1989 ;;Dvorak, J.C., John C. Dvorak
QuoteRef: dvorJC3_1997 ;;Dvorak, J.C., When push comes to shove
QuoteRef: dvorJC9_1997 ;;Dvorak, J.C., Inside track
QuoteRef: dysoF_1988 ;;Dyson, F., Infinite in all directions
QuoteRef: dysoG_2012 ;;Dyson, G., Turing's Cathedral
QuoteRef: dzidW7_1978 ;;Dzida, W. et al., User-perceived quality of interactive systems

Related up

ThesaHelp: references a-b
ThesaHelp: references e-f
ThesaHelp: references g-h
ThesaHelp: references i-l
ThesaHelp: references m-o
ThesaHelp: references p-r
ThesaHelp: references sa-sz
ThesaHelp: references t-z

Updated barberCB 4/23
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber