Map
Index
Random
Help
Group
Notes
Related
th

ThesaHelp: references g-h

topic root > Group: all references


--related--
all references
references a-b
references c-d
references e-f
references g-h
references i-l
references m-o
references p-r
references sa-sz
references t-z

--referenced--
all Thesa topics

Summary

Quotation references from 'g' to 'h'

Group members up

QuoteRef: gabeM10_2010 ;;Gabel, M. et al., Scalable and systematic detection of buggy inconsistencies in source code
QuoteRef: gageP2_1994 ;;Gage, P., A new algorithm for data compression,
QuoteRef: gahaN2_1979 ;;Gehani, N., A high level data structure--The grid
QuoteRef: galbJK_1976 ;;Galbraith, J.K., The affluent society
QuoteRef: galeC_172 ;;Galenus, C. (Galen), De Methodo Medendi [NewQuotes]
QuoteRef: galiG_1605 ;;Galilei, G., Dialogue concerning the new star by Cecco di Ronchitti of Brugine
QuoteRef: galiG_1610 ;;Galilei, G., Sidereus Nuncius
QuoteRef: galiG_1612 ;;Galilei, G, Discorso al serenissimo don Cosimo II, gran duca di Toscana, intorno alle cose, che stanno in su l'acqua
QuoteRef: galiG_1613 ;;Galilei, G., History and Demonstrations Concerning Sunspots [NewQuotes]
QuoteRef: galiG12_1613 ;;Galilei, G., Letter to [Benedetto] Castelli [NewQuotes]
QuoteRef: galiG12_1615 ;;Galilei, G., Letter to the Grand Duchess Christiana [NewQuotes]
QuoteRef: galiG_1623 ;;Galilei, G., The Assayer
QuoteRef: galiG_1632 ;;Galilei, G., Dialogo Di Galileo Galilei Linceo, Massimi Sistemi Del Mondo Tolemaico, e Copernicano
QuoteRef: galiG_1638 ;;Galilei, Galileo, Two New Sciences, including Centers of Gravity & Force of Percussion
QuoteRef: galiP_2003 ;;Galison, P., Einstein's Clocks, Poincare's Maps
QuoteRef: galkJT6_1980 ;;Galkowski, J.T., A critique of the DOD common language effort
QuoteRef: gallBA4_1967 ;;Galler, B.A., Perlis, A.J., A proposal for definitions in ALGOL
QuoteRef: gallBA_1970 ;;Galler, B.A., Perlis, A.J., A View of Programming Languages
QuoteRef: gallJA9_1996 ;;Gallian, J.A., Error detection methods
QuoteRef: gammE7_1993 ;;Gamma, E. et al., Design patterns: abstraction and reuse of object-oriented design
QuoteRef: gammR_1982 ;;Gammill, R., Thorp, L., Distributed processing of problem-solving applications for farmers
QuoteRef: gammRC10_1974 ;;Gammill, R.C., Software Reliability: Philosophical underpinnings
QuoteRef: gammRC_1981 ;;Gammill, R.C., A tiny portable language-independent macroprocessor and some applications
QuoteRef: ganaM10_1981 ;;Ganapathi, M., Fischer, C.N., Bibliography on automated retargetable code generation
QuoteRef: gangG1_2015 ;;Gange, G. et al., Interval analysis and machine arithmetic: why signedness ignorance is bliss
QuoteRef: gangG8_2021 ;;Gange, G. et al., A fresh look at zones and octagons [NewQuotes]
QuoteRef: gannJD8_1977 ;;Gannon, J.D., An experimental exaluation of data type conventions
QuoteRef: gannJD_1978 ;;Gannon, J.D., Characteristic errors in programming languages
QuoteRef: gantV8_1999 ;;Ganit, V. et al., Mining very large databases
QuoteRef: gaoQ3_2011 ;;Gao, Q. et al., 2ndStrike: Toward manifesting hidden concurrency typestate bugs
QuoteRef: garcR10_2003 ;;Garcia, R. et al., A comparative study of language support for generic programming
QuoteRef: gareF_2002 ;;Garelli, F., Ferrari, C., A dynamic model for mapping XML elements in a object-oriented fashion
QuoteRef: gargPK11_1987 ;;Garg, P.K., Scacchi, W., On designing intelligent hypertext systems for information management in software engineering
QuoteRef: garnR6_2011 ;;Garner, R. et al., A comprehensive evaluation of object scanning techniques
QuoteRef: gartB7_1999 ;;Gartner, B., Fast and robust smallest enclosing balls
QuoteRef: gateB7_1987 ;;Gates, B., Beyond macro processing
QuoteRef: gateB1_2008 ;;Gates, B., The tech revolution has just begun
QuoteRef: gausCF_1870 ;;Gauss, C.F., Disquisitiones Arithmeticae [NewQuotes]
QuoteRef: gaveWW4_1991 ;;Gaver, W.W., Smith, R.B., Effective sounds in complex systems: The ARKola simulation
QuoteRef: gayD3_2000 ;;Gay, D., Steensgaard, B., Fast escape analysis and stack allocation for object-based programs
QuoteRef: gayD6_2003 ;;Gay, D. et al., The nesC language: A holistic approach to networked embedded systems
QuoteRef: geX4_2017 ;;Ge, X. et al., Griffin: guarding control flows using Intel processor trace
QuoteRef: gearCW_1980 ;;Gear, C.W., Numerical Software: Science or Alchemy?
QuoteRef: gebaM3_2018 ;;Gebai, M., Degenais, M.R., Survey and analysis of kernel and userspace tracers on Linux: design, implementation, and overhead [NewQuotes]
QuoteRef: gebiJ4_2007 ;;Gebis, J., Peterson, D., Embracing and extending 20th-century instruction set architectures
QuoteRef: gehaA12_2021 ;;Gehani, A. et al., Digging into big provenance (with SPADE) [NewQuotes]
QuoteRef: geigRS2_2010 ;;Geiger, R.S., Ribes, D., The work of sustaining order in Wikipedia: The banning of a vandal
QuoteRef: gelbB12_2000 ;;Gelbord, B., Signing your 011001010 The problems of digital signatures
QuoteRef: gelbR1_2010 ;;Gelbard, R. et al., Object-oriented analysis -- is it just theory?
QuoteRef: geleD1_1985 ;;Gelernter, D., Generative communication in Linda
QuoteRef: geleD2_1992 ;;Galernter, D., Carriero, N., Coordination languages and their significance
QuoteRef: gellDP7_1974 ;;Geller, D.P., Weinberg, G.M., The principle of sufficient reason. A guide to language design for parallel processing
QuoteRef: gellM5_1978 ;;Geller, M., Test data as an aid in proving program correctness
QuoteRef: gellS3_2012 ;;Gelly, S. et al., The grand challenge of computer go: Monte Carlo tree search and extensions
QuoteRef: geneH_1984 ;;Geneen, H., with Moscow, A., Managing
QuoteRef: genkD6_2016 ;;Genkin, D. et al., Physical key extraction attacks on PCs [ExtraQuote]
QuoteRef: gennR2_2001 ;;Gennaro, R., Rohatgi, P., How to sign digital streams
QuoteRef: gentD8_1996 ;;Gentner, D., Nielson, J., The anti-Mac interface
QuoteRef: gentG_1932 ;;Gentzen, G., Uber die existenz unabhangiger aiomensysteme zu unendlichen satzsystem [NewQuotes]
QuoteRef: gentG_1935 ;;Gentzen, G., Untersuchungen uber das logische Schliessen [NewQuotes]
QuoteRef: gentG_1936 ;;Gentzen, G., Die widerspruchsfreiheit der reinen zahlentheorie [NewQuotes]
QuoteRef: gentG_1938 ;;Gentzen, G., Neue fassung des widerspruchsfreiheitsbeweises fur die reine Zahlentheorie [NewQuotes]
QuoteRef: gentG_1938a ;;Gentzen, G., Die gegenwartige large in der mathematischen grundlagenforschung [NewQuotes]
QuoteRef: gentWM5_1981 ;;Gentleman, W.M., Message passing between sequential processes: the reply primitive and the administrator concept
QuoteRef: georA10_2007 ;;Georges, A. et al., Statistically rigorous Java performance evaluation
QuoteRef: georJ12_1977 ;;Georges, J., Heymans, F., On parameteric array expressions
QuoteRef: gescCC1_1983 ;;Geschke, C.C., A system for programming and controlling sensor-based robot manipulators
QuoteRef: gescCM6_1975 ;;Geschke, C.M., Mitchell, J.G., On the problem of uniform reference to data structures
QuoteRef: gescCM8_1977 ;;Geschke, C.M. et al., Early experience with Mesa
QuoteRef: getoV8_2021 ;;Getov, V., Insights into the origins of the IEEE Computer Society and the invention of electronic digital computing [NewQuotes]
QuoteRef: gettJ1_2012 ;;Gettys, J., Nichols, K., Bufferbloat: Dark buffers in the Internet
QuoteRef: geweFL5_2021 ;;Gewers, F.L. et al., Principal component analysis: a natural approach to data exploration [NewQuotes]
QuoteRef: ghemS6_2000 ;;Ghemawat, S. et al., Field analysis: getting useful and low-cost interprocedural information
QuoteRef: ghenR7_1978 ;;van Ghent, R., Letter on real software, regarding the commentary by Dijkstra and the reply by DeMillo, Lipton, and Perlis
QuoteRef: gherS10_2003 ;;Ghemawat, S. et al., The Google file system
QuoteRef: ghiyR1_1998 ;;Ghiya, R., Hendren, L.J., Putting pointer analysis to work
QuoteRef: gibbM2_2006 ;;Gibbs, M., Stroustrup, B., Fast dynamic casting
QuoteRef: gibsVR3_1989 ;;Gibson, V.R., Senn, J.A., System structure and software maintenance performance
QuoteRef: giegR7_1999 ;;Giegerich, R. et al., Efficient implementation of lazy suffix trees
QuoteRef: giesF_1994 ;;Gies, F., Gies, J., Cathedral, Forge, and Waterwheel: Technology and invention in the Middle Ages [NewQuotes]
QuoteRef: giffDK_1979 ;;Gifford, D.K., Weighted voting for replicated data
QuoteRef: giffDK4_1982 ;;Gifford, D.K., Cryptographic sealing for information secrecy and authentication
QuoteRef: giffDK5_1985 ;;Gifford, D.K. et al., The application of digital broadcast communication to large scale information systems
QuoteRef: giffDK7_1985 ;;Gifford, D.K. et al., Distributed Systems
QuoteRef: giffDK12_1985 ;;Gifford, D.K. et al., An architecture for large scale information systems
QuoteRef: giffDK3_1988 ;;Gifford, D.K. et al., The Cedar file system
QuoteRef: gilJ8_2008 ;;Gil, J. (Y.) et al., Two-dimensional bidirectional object layout
QuoteRef: gilbA6_2010 ;;Gilbert, A., Indyk, P., Sparse recovery using sparse matrices
QuoteRef: gilbH9_1998 ;;Gilbert, H., Techniques for low cost authentication and message authentication
QuoteRef: gilbT_1977 ;;Gilb, T., Software Metrics
QuoteRef: gilbW_1600 ;;Gilbert, W., On the loadstone and magnetic bodies and on the great magnet the Earth [OK]
QuoteRef: gillMA_2008 ;;Gillespie, M.A., The Theological Origins of Modernity
QuoteRef: gilmDJ9_1987 ;;Gilmore, D.J., Green, T.R.G., Are 'programming plans' psychologically real--outside Pascal?
QuoteRef: giloCF10_1991 ;;Giloth, C.F., Audience Participation: A large-scale group interaction experiment
QuoteRef: giloT7_1985 ;;Gilovich, T. et al., The hot hand in basketball: on the misperception of random sequences
QuoteRef: gilsE_1940 ;;Gilson, E., The Spirit of Mediaeval Philosophy (Gifford Lectures 1931-1932)
QuoteRef: gimpJ_1976 ;;Gimpel, J., The Medieval Machine: The Industrial Revolution of the Middle Ages [NewQuotes]
QuoteRef: gimpJ3_1989 ;;Gimpel, J., Gimpel, A., Competing with Giants: Opportunities for success
QuoteRef: gimpJF6_1972 ;;Gimpel, J.F., Blocks--A new datatype for Snobol 4
QuoteRef: giniGC4_1985 ;;Gini, G.C., Gini, M.L., Dealing with world-model-based programs
QuoteRef: gionA9_1999 ;;Gionis, A. et al., Similarity search in high dimensions via hashing
QuoteRef: giraM4_1991 ;;Girault, M., Self-certified public keys
QuoteRef: gladHM5_2001 ;;Gladney, H.M., Cantu, A., Authorization management for digital libraries
QuoteRef: glasRL3_1981 ;;Glass, R.L., Persistent software errors
QuoteRef: glasRL9_1997 ;;Glass, R.L., Cobol--A contradiction and an enigma
QuoteRef: glasRL7_2008 ;;Glass, R.L., Two mistakes and error-free software: a confession
QuoteRef: glasS12_1995 ;;Glassman, S. et al., The millicent protocol for inexpensive electronic commerce
QuoteRef: glavB7_2014 ;;Glavic, B. et al., Efficient stream provenance via operator instrumentation
QuoteRef: gleeJ_2012 ;;Gleeson-White, J., Double Entry : How the Merchants of Venice Created Modern Finance
QuoteRef: gleiJ12_1985 ;;Gleick, J.x, The man who reshaped geometry
QuoteRef: gleiM10_2019 ;;Gleirscher, M. et al., New opportunities for integrated formal methods [NewQuotes]
QuoteRef: glenAE2_1953 ;;Glennie, A.E., The automatic coding of an electronic computer
QuoteRef: gligV3_2010 ;;Gligor, V., Security limitations of virtualization and how to overcome them
QuoteRef: gligVD11_1979 ;;Gligor, V.D., Lindsay, B.G., Object migration and authentication
QuoteRef: glusRJ5_1989 ;;Glushko, R.J., Transforming text into hypertext for a compact disc encyclopedia
QuoteRef: godbM2_2020 ;;Godbolt, M., Optimizations in C++ compilers [NewQuotes]
QuoteRef: godeK_1931 ;;Godel, K., On formally undecidable propositions of Principia mathematica and related systems I
QuoteRef: godeP1_1997 ;;Godefroid, P., Model checking for programming languages using VeriSoft
QuoteRef: godeP1_2010 ;;Godefroid, P. et al., Compositional may-must program analysis: unleashing the power of alternation
QuoteRef: godeP3_2012 ;;Godefroid, P. et al., Sage: Whitebox fuzzing for security testing
QuoteRef: gogS7_2016 ;;Gog, S., Venturini, R., Fast and compact hamming distance index
QuoteRef: golang_2013 ;;no author, The Go Programming Language Specification
QuoteRef: goldA3_1976 ;;Goldberg, A., Kay, A., Smalltalk-72 Instructional Manual
QuoteRef: goldA_1986 ;;Goldberg, A., Programmer as reader
QuoteRef: goldA10_1995 ;;Goldberg, A., Why Smalltalk?
QuoteRef: goldCF6_1981 ;;Goldfarb, C.F., A generalized approach to document markup
QuoteRef: goldD3_1991 ;;Goldberg, D., What every computer scientist should know about floating-point arithmetic
QuoteRef: goldD6_1992 ;;Goldberg, D., The design of floating-point data types
QuoteRef: goldD4_1993 ;;Goldberg, D., Richardson, C., Touch-typing with a stylus
QuoteRef: goldEP8_1982 ;;Goldenberg, E.P., Logo- a cultural glossary
QuoteRef: goldHH_1948 ;;Goldstine, H.H., von Neumann, J., Planning and coding of problems for an electronic computing instrument, Report on the mathematical and logical aspects of a electronic computing instrument
QuoteRef: goldHH_1972 ;;Goldstine, H.H., The Computer: from Pascal to von Neumann [NewQuotes]
QuoteRef: goldO10_1986 ;;Goldreich, O. et al., How to construct random functions
QuoteRef: goldO11_2001 ;;Golman, O., What are checked exceptions?
QuoteRef: goldO11_2003 ;;Goldman, O., Command-line argument processing and the Argv library
QuoteRef: goldR_1985 ;;Goldman, R., Design of an interactive Manipulator Programming Environment
QuoteRef: goldR_2005 ;;Goldstein, R.,, Incompleteness : The proof and paradox of Kurt Godel
QuoteRef: goldY11_1992 ;;Goldberg, Y. et al., Active Mail--a framework for implementing groupware
QuoteRef: gomaH11_1982 ;;Gomaa, H., Martello, S.J., A partially automated method for testing interactive systems
QuoteRef: gongL11_2011 ;;Gong, L., Java security architecture revisited
QuoteRef: gonnGH4_1981 ;;Gonnet, G.H., Expected length of the longest probe sequence in hash code searching
QuoteRef: gonnGH7_1981 ;;Gonnet, G.H., Coding Benchmark for Utopia84
QuoteRef: goodB8_2017 ;;Goodwin, B. et al., BitFunnel: revisiting signatures for search [NewQuotes]
QuoteRef: goodDI_1974 ;;Good, D.I., Provable programs and processors
QuoteRef: goodFL_1981 ;;Goodman, F.L., Computers and the future of literacy
QuoteRef: goodJB_1968 ;;Goodenough, J.B., The comparison of programming languages: a linguistic approach
QuoteRef: goodJB12_1975 ;;Goodenough, J.B., Exception handling: issues and a proposed notation
QuoteRef: goodJB2_1976 ;;Goodenough, J.B., Shafer, L.H., A study of high level language features
QuoteRef: goodJB8_1976 ;;Goodenough, J.B., An exploratory study of reasons for HOL object code inefficiency entries
QuoteRef: goodJB_1977 ;;Goodenough, J.B., Gerhart, S.L., Toward a theory of testing: Data selection criteria
QuoteRef: goodM6_1981 ;;Good, M., Etude and the folklore of user interface design
QuoteRef: goodMD10_1984 ;;Good, M.D. et al., Building a user-derived interface
QuoteRef: goodN12_1947 ;;Goodman, N., Quine, W.V., Steps toward a constructive nominalism
QuoteRef: goodN_1956 ;;Goodman, N. et al., A world of individuals [NewQuotes]
QuoteRef: gopaRD7_2001 ;;Gopal, R.D. et al., Criss-cross hash joins: design and analysis
QuoteRef: gopiM8_2000 ;;Gopi, M. et al., Surface reconstruction based on lower dimensional localized Delaunay triangulation
QuoteRef: gordCS10_2012 ;;Gordon, C.S. et al., Uniqueness and reference immutability for safe parallelism
QuoteRef: gordP10_2004 ;;Gordon, P., Numerical cognition without words: evidence from Amazonia
QuoteRef: gordRD3_1979 ;;Gordon, R.D., Measuring improvements in program clarity
QuoteRef: gordRM3_1990 ;;Gordon, R.M., letter to the editor
QuoteRef: goreM10_2003 ;;Goresky, M., Klapper, A., Efficient multiply-with-carry random number generators with maximal period
QuoteRef: goriJ9_2018 ;;Gori, J. et al., Speed-accuracy tradeoff: A formal information-theoretic transmission scheme (FITTS)
QuoteRef: goroN1_2019 ;;Gorogiannis, N. et al., A true positives theorem for a static race detector [NewQuotes]
QuoteRef: goslJ6_1997 ;;Gosling, J., The feel of Java
QuoteRef: gottA4_1983 ;;Gottlieb, A et al., Basic techniques for the efficient coordination of very large numbers of cooperating sequential processors
QuoteRef: goudMG5_1998 ;;Gouda, M.G., Accelerated heartbeat protocols
QuoteRef: goulJD9_1973 ;;Gould, J.D., Some psychological evidence on how people debug computer programs
QuoteRef: goulJD3_1985 ;;Gould, J.D., Lewis, C., Designing for usability: Key principles and what designers think
QuoteRef: goulJD4_1987 ;;Gould, J.D. et al., Why reading was slower from CRT displays than from paper
QuoteRef: goulJD8_1987 ;;Gould, J.D. et al., The 1984 olympic message system: A test of behavioral principles of system design
QuoteRef: goviS5_2003 ;;Govindavajhala, S., Appel, A.W., Using memory errors to attack a virtual machine
QuoteRef: gracG6_2009 ;;Gracioli, G., Fischmeister, S., Tracing interrupts in embedded software
QuoteRef: gracG11_2015 ;;Gracioli, G. et al., A survey on cache management mechanisms for real-time embedded systems
QuoteRef: graeG9_2006 ;;Graefe, G., Implementing sorting in database systems
QuoteRef: graeG7_2009 ;;Graefe, G., The five-minute rule 20 years later (and how flash memory changes the rules)
QuoteRef: grahG6_2018 ;;Grahne, G., Moallemi, A., A useful four-valued database logic [NewQuotes]
QuoteRef: grahL_2009 ;;Graham, L., Kantor, J.-M., Naming Infinity: A True Story of Religious Mysticism and Mathematical Creativity [NewQuotes]
QuoteRef: grahRM2_1973 ;;Graham, R.M. et al., A software design and evaluation system
QuoteRef: grahSL6_1982 ;;Graham, S.L. et al., gprof: a call graph execution profiler
QuoteRef: gramAY8_1993 ;;Grama, A.Y. et al., Isoefficiency: measuring the scalability of parallel algorithms and architectures
QuoteRef: gramFT7_1978 ;;Grampp, F.T., Letter to the editor
QuoteRef: gramV2_2015 ;;Gramoli, V., More than you ever want to know about synchronization. Synchrobench, measuring the impact of synchronization on concurrent algorithms
QuoteRef: granCA12_1971 ;;Grant, C.A., Syntax translation with context macros, or macros without arguments
QuoteRef: granE_2001 ;;Grant, E., God and Reason in the Middle Ages [NewQuotes]
QuoteRef: granRL_1970 ;;Granger, R.L., Robinson, G.S., COMSL- a communication system simulation language
QuoteRef: grasH_1844 ;;Grassmann, H., Die Lineale Ausdehnungslehre, ein neuer Zweig der Mathematik ... [NewQuotes]
QuoteRef: gravTL5_2001 ;;Graves, T.L., Mockus, A., Identifying productivity drivers by modeling work units using partial data
QuoteRef: grayCG12_1989 ;;Gray, C.G., Cheriton, D.R., Leases: an efficient fault-tolerant mechanism for distributed file cache consistency
QuoteRef: grayDN5_1998 ;;Gray, D.N. et al., Modern languages and Microsoft's component object model
QuoteRef: grayJ11_1985 ;;Gray, J., Why do computers stop and what can be done about it?
QuoteRef: grayJ8_1988 ;;Gray, J., The cost of messages
QuoteRef: grayJ6_1996 ;;Gray, J. et al., The dangers of replication and a solution
QuoteRef: grayJ6_2003 ;;Gray, J., A conversation with Jim Gray [as interviewed by Dave Patterson]
QuoteRef: grayJ5_2006 ;;Gray, J., A conversation with Werner Vogels
QuoteRef: grayJC_1973 ;;Gray, J.C., Tomlinson, J.C., The L* data language
QuoteRef: grayJN6_1986 ;;Gray, J.N., An approach to decentralized computer systems
QuoteRef: graySH2_1989 ;;Gray, S.H., Shasha, D., To link or not to link? Empirical guidance for the design of nonlinear text systems
QuoteRef: greeA3_2011 ;;Greenberg, A. et al., VL2: a scalable and flexible data center network
QuoteRef: greeR9_1995 ;;Green, R., Topical relevance relationships, I. Why topic matching fails
QuoteRef: greeR12_2011 ;;Green, R., Ledgard, H., Coding guidelines: Finding the art in the science
QuoteRef: greeS_1950 ;;Greenberg, S., The infinite in Giordano Bruno
QuoteRef: greeS1_2012 ;;Greenberg, S. et al., The narrative storyboard. Telling a story about use and context over time
QuoteRef: greeTJ_1979 ;;Greer, T.J. Jr., Writing and understanding U. S. Patent claims
QuoteRef: greeTR_1980 ;;Green, T.R.G., Programming as a cognitive activity
QuoteRef: greeTRG_1989 ;;Green, T.R.G., Cognitive dimensions of notations
QuoteRef: greeTRG9_1992 ;;Green, T.R.G., Petre, M., When visual programs are harder to read than textual programs
QuoteRef: gregB2_2013 ;;Gregg, B., Thinking methodically about performance
QuoteRef: gregB6_2016 ;;Gregg, B., The flame graph
QuoteRef: gregD6_2001 ;;Gregg, D. et al., Implementing an efficient Java interpreter
QuoteRef: gremLL9_1982 ;;Gremillion, L.L., Designing a Bloom filter for differential file access
QuoteRef: grieD_1971 ;;Gries, D., Compiler construction for digital computers
QuoteRef: grieD_1979 ;;Gries, D., Current ideas in programming methodology
QuoteRef: grieD_1981 ;;Gries, D., The Science of Programming
QuoteRef: grieD7_1990 ;;Gries, D., letter to the editor
QuoteRef: grieDA_2005 ;;Grier, D.A., When Computers Were Human
QuoteRef: grieG9_2016 ;;Grieco, G. et al., QuickFuzz: an automatic random fuzzer for common file formats
QuoteRef: grifG7_1987 ;;Grifiths, G., Stones, G.C., The tea-leaf reader algorithm: An efficient implementation of CRC-16 and CRC-32
QuoteRef: grigPF3_1972 ;;Griggith P.F., Henry, R.M., An investigatory study into human problem solving capabilities as they relate to program efficiency
QuoteRef: grimJD5_1982 ;;Grimes, J.D., presentation
QuoteRef: grimR2_2001 ;;Grimm, R., Bershad, B.N., Separating access control policy, enforcement, and functionality in extensible systems
QuoteRef: grisRE_1972 ;;Griswold, R.E., The Macro Implementation of SNOBOL4
QuoteRef: grisRE4_1979 ;;Griswold, R.E. et al., The Icon programming language: An overview
QuoteRef: grisRE4_1980 ;;Griswold, R.E., Hanson, D.R., An alternative to the use of patterns in string processing
QuoteRef: grocJM_1982 ;;Grochow, J.M., Application generators: an introduction
QuoteRef: grosAD4_1991 ;;Gross, A.D., Getty synoname: the development of software for personal name pattern matching
QuoteRef: grosE5_2021 ;;Grosse, E. et al., Implementing insider defenses [NewQuotes]
QuoteRef: grosR5_2000 ;;Grossi, R., Vitter, J.S., Compressed suffix arrays and suffix trees with applications to text indexing and string matching
QuoteRef: grovLJ11_1982 ;;Groves, L.J., Using simple English sentences to call procedures
QuoteRef: grudJ9_1988 ;;Grudin, J., Why CSCW applications fail: Problems in the design and evaluation of organizational interfaces
QuoteRef: grudJ12_2002 ;;Grudin, J., Group dynamics and ubiquitous computing
QuoteRef: grunL10_1981 ;;Grune, D., From VW-grammar to ALEPH
QuoteRef: guR10_2019 ;;Gu, R. et al., Building certified concurrent OS kernels [NewQuotes]
QuoteRef: gudeE9_1980 ;;Gudes, E., The design of a cryptography based secure file system
QuoteRef: guevM2_2021 ;;Guevara, M. et al., Differential privacy: The pursuit of protections by default [NewQuotes]
QuoteRef: guhaRV2_2016 ;;Guha, R.V. et al., Schema.org: evolution of structured data on the web
QuoteRef: guilC_1148 ;;Guillaume de Conches (William of Conches), Dragmaticon Philosophiae [NewQuotes]
QuoteRef: guimML6_2012 ;;Guimaraes, M. L., Silva, A. R., Improving early detection of software merge conflicts
QuoteRef: guliR_1992 ;;van Gulick, R., Philosophical questions
QuoteRef: gullWE2_1979 ;;Gull, W.E., Jenkins, M.A., Recursive data structures in APL
QuoteRef: gulwS1_2004 ;;Gulwani, S., Necula, G.C., Global value numbering using random interpretation
QuoteRef: gunnIE7_1979 ;;Gunn, I.E., Morrison, R., On the implementation of constants
QuoteRef: guoP9_2014 ;;Guo, P., Small-group code reviews for education (blog@cacm)
QuoteRef: guoPJ3_2013 ;;Guo, P.J., Online python tutor: embeddable web-based program visualization for CS education
QuoteRef: guptA7_2016 ;;Gupta, A. et al., Mesa: A geo-replicated online data warehouse for Google's advertising system
QuoteRef: guptD10_2010 ;;Gupta, D. et al., Difference engine: harnessing memory redundancy in virtual machines
QuoteRef: guptI8_2001 ;;Gupta, I. et al., On scalable and efficient distributed failure detectors
QuoteRef: guptNK1_1997 ;;Gupta, N.K. et al., Auditdraw: generating audits the FAST way
QuoteRef: guptR3_1993 ;;Gupta, R., Optimizing array bound checks using flow analysis
QuoteRef: guptR3_1994 ;;Gupta, R. et al., On randomization in sequential and distributed algorithms
QuoteRef: gursAF4_1974 ;;Gurski, A.F., Towards a high-level job control language
QuoteRef: gutkJ9_1985 ;;Gutknecht, J., Concepts of the text editor Lara
QuoteRef: gutmP7_1996 ;;Gutmann, P., Secure deletion of data from magnetic and solid-state memory
QuoteRef: gutmP1_1998 ;;Gutmann, P., Software generation of practically strong random numbers
QuoteRef: gutmP8_2002 ;;Gutmann, P., PKI: It's not dead, just resting
QuoteRef: gutmP2_2004 ;;Gutmann, P., Simplifying public key management
QuoteRef: guttJV12_1974 ;;Guttag, J.V. et al., Dyadic specification and its impact on reliability; in
QuoteRef: guttJV6_1977 ;;Guttag, J.V., Abstract data types and the development of data structures
QuoteRef: guttJV9_1985 ;;Guttag, J.V. et al., The Larch family of specification languages
QuoteRef: guttJV_2002 ;;Guttag, J.V., Abstract data types, then and now
QuoteRef: guttL6_1977 ;;Guttman, L., What is not what in statistics
QuoteRef: guyI3_2018 ;;Guy, I., The characteristics of voice search: comparing spoken with typed-in mobile web search queries
QuoteRef: guyeSZ6_2006 ;;Guyer, S.Z. et al., Free-me: a static analysis for automatic individual object reclamation.
QuoteRef: haasA6_2017 ;;Haas, A. et al., Bringing the web up to speed with WebAssembly
QuoteRef: habeAN6_1975 ;;Habermann, A.N., Path expressions
QuoteRef: habeRN5_1970 ;;Haber, R.N., How we remember what we see
QuoteRef: hackB5_2006 ;;Hackett, B. et al., Modular checking for buffer overflows in the large
QuoteRef: hackB6_2012 ;;Hackett, B., Guo, S., Fast and precise hybrid type inference of JavaScript
QuoteRef: hackI_1975 ;;Hacking, I., The Emergence of Probability. A philosophical study of early ideas about probability, induction, and statistical inference
QuoteRef: hackI_1975a ;;Hacking, I., Why Does Language Matter to Philosophy
QuoteRef: hackI6_2007 ;;Hacking, I., Putnam's theory of natural kinds and their names is not the same as Kripke's
QuoteRef: haecE_1876 ;;Haeckel, E., Anthropogenie: oder, Entwicklungsgeschichte des Menschen [OK NewQuotes]
QuoteRef: haecE_1900 ;;Haeckel, E., The Riddle of the Universe, at the close of the nineteenth century [OK NewQuotes]
QuoteRef: hagmR_1987 ;;Hagmann, R., Reimplementing the Cedar File system using logging and group commit
QuoteRef: hainDP3_1997 ;;Haine, D.P., Claris Organizer's expanding contact card
QuoteRef: hakoH_1999 ;;Hakonen, H., Raita, T., A family of fast constant-space substring search algorithms
QuoteRef: halaF2_1994 ;;Halasz, F.A., Schwartz, M., The Dexter Reference Model
QuoteRef: halaFG4_1987 ;;Halasz, F.G. et al., NoteCards in a nutshell
QuoteRef: halaFG7_1988 ;;Halasz, F.G., Reflections on Notecards: Seven issues for the next generation of hypermedia systems
QuoteRef: haleS8_1999 ;;Halevi, S., Krawczyk, H., Public-key cryptography and password protocols
QuoteRef: halfWG5_2006 ;;Halfond, W.G.J., Orso, A., Preventing SQL injection attacks using AMNESIA
QuoteRef: haliU7_1991 ;;Halici, U., Dogac, A., An optimistic locking technique for concurrency control in distributed databases
QuoteRef: hallA9_1990 ;;Hall, A., Seven myths of formal methods
QuoteRef: hallDE9_1980 ;;Hall, D.E. et al., A virtual operating system
QuoteRef: hallEC_1996 ;;Hall, E.C., Journey to the Moon: The History of the Apollo Guidance Computer
QuoteRef: hallH_1992 ;;Hall, H., Phenomenology
QuoteRef: hallJC5_1974 ;;Hallyburton, J.C., Jr., Advanced data structure manipulation facilities for the SNOBOL 4 programming language
QuoteRef: hallPA12_1980 ;;Hall, P.A.V., Dowlink, G.R., Approximate string matching
QuoteRef: hallS11_2018 ;;Halle, S. et al., Streamlining the inclusion of computer experiments in a research paper
QuoteRef: hallW1_1994 ;;Hall, W., Ending the tyranny of the button
QuoteRef: hallWE5_1986 ;;Hall, W.E. III, Zweben, S.H., The Cloze procedure and software comprehensibility measurement
QuoteRef: halpJY12_2005 ;;Halpern, J.Y., Pearl, J., Causes and explanations: A structural-model approach. part I: Causes
QuoteRef: halpJY12_2005a ;;Halpern, J.Y., Pearl, J., Causes and explanations: A structural-model approach. part I: Explanations
QuoteRef: halpMI_1966 ;;Halpern, M.I., Foundations of the case for natural language programming
QuoteRef: halpMI1_1968 ;;Halpern, M.I., Toward a general processor for programming languages
QuoteRef: halsMH_1975 ;;Halstead, M.H., Toward a theoretical basis for estimating programming effort
QuoteRef: hamePG9_1982 ;;Hamer, P.G., Frewin, G.D., M.H. Halstead's software science -- A critical examination
QuoteRef: hamiJ2_2003 ;;Hamilton, J., Language interpretation in the Common Language Runtime
QuoteRef: hamiM3_1976 ;;Hamilton, M., Zeldin, S., Higher order software--A methodology for defining software
QuoteRef: hamiM_1978 ;;Hamilton, M., Zeldin, S., Reliability in terms of predictability
QuoteRef: hamiM12_2008 ;;Hamilton, M., Hackler, W.R., Universal systems language: lessons learned from Apollo
QuoteRef: hamiM_2019 ;;Hamilton, M., In their own words: Margaret Hamilton on her daughter's simulation [NewQuotes]
QuoteRef: hamiMH6_1990 ;;Hamilton, M.H., Hackler, W.R., 001: A rapid development approach for rapid prototyping based on a system that supports its own life cycle
QuoteRef: hamiMH3_2007 ;;Hamilton, M.H., Hackler, W.R., Universal systems language for preventative systems engineering
QuoteRef: hamlD12_1990 ;;Hamlet, D., Partition testing does not inspire confidence
QuoteRef: hammC5_2008 ;;Hammer, C. et al., Dynamic detection of atomic-set-serializability violations
QuoteRef: hammJ7_2022 ;;Hammer, J., Reig, S., From individual rights to community obligations: a Jewish approach to speech [NewQuotes]
QuoteRef: hammL9_1997 ;;Hammond, L. et al., A single-chip multiprocessor
QuoteRef: hammMA10_2016 ;;Hammer, M.A. et al., A vision for online verification-validation
QuoteRef: hammRW_1991 ;;Hamming, R.W., The art of probability--for scientists and engineers [NewQuotes]
QuoteRef: hanS6_2012 ;;Han, S. et al., Performance debugging in the large via mining millions of stack traces
QuoteRef: hanaS8_1980 ;;Hanata, S., Satoh, T., COMPACT CHART -- A program logic notation with high describability and understandability
QuoteRef: handP_1981 ;;Handlykken, P., Nygaard, K., The DELTA system description language: Motivation, main concepts and experience from use
QuoteRef: haneFM_1972 ;;Haney, F.M., Module connection analysis-- a tool for scheduling software debugging activities
QuoteRef: hanfKV_1973 ;;Hanford, K.V., Jones, C.B., Dynamic syntax: A concept of the definition of the syntax of programming languages
QuoteRef: hangS5_2009 ;;Hangal, S., Lam, M.S., Automatic dimension inference and checking for object-oriented programs
QuoteRef: hannJ_2009 ;;J. Hannam, God's Philosophers: How the Medieval World Laid the Foundations of Modern Science
QuoteRef: hansDR3_1978 ;;Hanson, D.R., Event associations in Snobol4 for program debugging
QuoteRef: hansDR3_1978a ;;Hanson, D.R., Data structures in SL5
QuoteRef: hansDR5_1978 ;;Hanson, D.R., The SL5 procedure mechanism
QuoteRef: hansDR5_1978a ;;Hanson, D.R., Filters in SL5
QuoteRef: hansDR11_1979 ;;Hanson, D.R., A simple technique for controlled communication among separately compiled modules
QuoteRef: hansDR1_1990 ;;Hanson, D.R., Fast allocation and deallocation of memory based on object lifetimes
QuoteRef: hansDR8_1999 ;;Hanson, D.R., A machine-independent debugger--revisited
QuoteRef: hansDR6_2001 ;;Hanson, D.R., Proebsting, T.A., Dynamic variables
QuoteRef: hansDR3_2004 ;;Hanson, D.R., lcc.NET: targeting the .NET common intermediate language from standard C
QuoteRef: hansPB6_1994 ;;Hansen, P.B., Multiple-length division revisited: a tour of the minefield
QuoteRef: hansR_1987 ;;Hanson, R., Toward hypertext publishing. Issues and choices in database design
QuoteRef: hansWJ9_1988 ;;Hansen, W.J., Haas, C., Reading and writing with computers: A framework for explaining differences in performance
QuoteRef: hansWJ10_1992 ;;Hansen, W.J., Subsequence references: First-class values for substrings
QuoteRef: harbS2_1991 ;;Haber, S., Stornetta, How to time-stamp a digital document
QuoteRef: harbSP3_1982 ;;Harbison, S.P., An architectural alternative to optimizing compilers
QuoteRef: hardB6_2007 ;;Hardekopf, B., Lin, C., The ant and the grasshopper: Fast and accurate pointer analysis for millions of lines of code
QuoteRef: hardB1_2009 ;;Hardekopf, B., Lin, C., Semi-sparse flow-sensitive pointer analysis
QuoteRef: hardGH_1940 ;;Hardy, G.H., A Mathematician's Apology
QuoteRef: hareD5_1988 ;;Harel, D., On visual formalisms
QuoteRef: hareD1_1992 ;;Harel, D., Biting the silver bullet. Toward a brighter future for system development
QuoteRef: hareD10_2021 ;;Harel, D. et al., Scenario-based algorithmics: coding algorithms by automatic composition of separate concerns [NewQuotes]
QuoteRef: harmDE5_1991 ;;Harms, D.E., Weide, B.W., Copying and swapping: Influences on the design of reusable software components
QuoteRef: harpR_2013 ;;Harper, R., Practical Foundations for Programming Languages
QuoteRef: harrJ10_1998 ;;Harris, J., Sarkar, V., Lightweight object-oriented shared variables for distributed applications on the Internet
QuoteRef: harrMA3_2004 ;;Harris, M.A., Reingold, E.M., Line drawing, leap years, and Euclid
QuoteRef: harrMJ6_1998 ;;Harrold, M.J. et al., Empirical studies of control dependence graph size for C programs
QuoteRef: harrR10_2015 ;;Harris, R., Dismantling the barriers to entry
QuoteRef: harrT10_2003 ;;Harris, T., Fraser, K., Language support for lightweight transactions
QuoteRef: harrT8_2008 ;;Harris, T. et al., Composable memory transactions
QuoteRef: harrWR6_2011 ;;Harris, W.R., Gulwani, S., Spreadsheet table transformations from examples
QuoteRef: hartDR_1947 ;;Hartree, D.R., Calculating Machines. Recent and Prospective Developments and their impact on Mathematical Physics
QuoteRef: hartDR_1949 ;;Hartree, D.R., Calculating Instruments and Machines [NewQuotes]
QuoteRef: hartH7_2016 ;;Hartmann, H., Statistics for engineers
QuoteRef: hartJ2_2011 ;;Harty, J., Finding usability bugs with automated tests
QuoteRef: hartPE6_2003 ;;Hart, P.E., Liu, Z., Trust in the preservation of digital information
QuoteRef: hartPH12_2001 ;;Hartel, P.H., Moreau, L., Formalizing the safety of Java, the Java virtual Machine, and Java Card
QuoteRef: hartRV7_1928 ;;Hartley, R.V.L., transmission of information
QuoteRef: hartSP10_1993 ;;Harter, S.P. et al., Semantic relationships between cited and citing articles in library and information science journals
QuoteRef: harvNJA3_2003 ;;Harvey, N.J.A. et al., SkipNet: a scalable overlay network with practical locality properties
QuoteRef: harvW_1628 ;;Harvey, W., Harvey, W., Exercitatio Anatomica de Motu Cordis et Sanguinis in Animalibus [NewQuotes]
QuoteRef: harvW_1649 ;;Harvey, W., Harvey, W., Exercitatio Anatomica de circulatione Sanguinis [NewQuotes]
QuoteRef: harvW5_1936 ;;Harvey, W. [NewQuotes]
QuoteRef: harvW10_1997 ;;Harvey, W. et al., Compiling constraint solving using projection
QuoteRef: hasaR12_2009 ;;Hasan, R. et al., Preventing history forgery with secure provenance
QuoteRef: haskCH_1957 ;;Haskins, C.H., The Renaissance of the Twelfth Century [NewQuotes]
QuoteRef: haskJA8_1984 ;;Haskett, J.A., Pass-algorithms: A user validation scheme based on knowledge of secret algorithms
QuoteRef: haslB2_2010 ;;Haslhofer, B., Klas, W., A survey of techniques for achieving metadata interoperability
QuoteRef: hatcJ6_2012 ;;Hatcliff, J. et al., Behavioral interface specification languages
QuoteRef: hathC6_2015 ;;Hathhorn, C. et al., Defining the undefinedness of C*
QuoteRef: hattL10_1994 ;;Hatton, L., Roberts, A., How accurate is scientific software?
QuoteRef: hattL3_1997 ;;Hatton, L., Reexamining the fault density--component size connection
QuoteRef: hattL4_1997 ;;Hatton, L., The T experiments: Errors in scientific software
QuoteRef: hattL11_1997 ;;Hatton, L., N-version design versus one good version
QuoteRef: hattL5_1998 ;;Hatton, L., Does OO sync with how we think?
QuoteRef: hausHL3_1981 ;;Hausen, H.-L., Mullerburg, M., Conspectus of software engineering environments
QuoteRef: hausMD_2000 ;;Hauser, M.D., Wild Minds: What Animals Really Think
QuoteRef: hausRC11_1994 ;;Hauser, R.C., Does licensing require new access control techniques?
QuoteRef: hauzBM10_1986 ;;Hauzeur, B.M., A model for naming, addressing, and routing
QuoteRef: haveK8_2001 ;;Havelaund, K. et al., Formal analysis of a space-craft controller using SPIN
QuoteRef: hawbC7_2017 ;;Hawblitzel, C. et al., IronFleet: proving safety and liveness of practical distributed systems
QuoteRef: hawtPB1_1982 ;;Hawthorn, P.B., DeWitt, D.J., Performance analysis of alternative database machine architectures
QuoteRef: haydCM10_2012 ;;Hayden, C.M. et al., Kitsune: efficient, general-purpose dynamic software updating for C
QuoteRef: hayeFA9_1945 ;;Hayek, F.A., The use of knowledge in society
QuoteRef: hayePJ_1982 ;;Hayes, P.J., Uniform help facilities for a cooperative user interface
QuoteRef: heckP4_1978 ;;Heckel, P., A technique for isolating differences between files
QuoteRef: heckP8_1982 ;;Heckel, P., Communication is the key
QuoteRef: heckP_1984 ;;Heckel, P., The Elements of Friendly Software Design
QuoteRef: heddA10_1989 ;;Heddaya, A. et al., Two phase gossip: managing distributed event histories
QuoteRef: heerJ4_1985 ;;Heering, J., Klint, P., Towards monolingual programming environments
QuoteRef: heerJ11_1989 ;;Heering, J. et al., The syntax definition formalism SDF
QuoteRef: hegeGW_1812 ;;Hegel, G.W.F., Wissenschaft der Logik [NewQuotes]
QuoteRef: hehnEC7_1975 ;;Hehner, E.C.R., Merlin: Towards an ideal programming language
QuoteRef: hehnEC_1977 ;;Hehner, E.C.R., Structuring
QuoteRef: hehnEC_1977a ;;Hehner, E.C.R., A simple view of variables and parameters
QuoteRef: hehnEC3_1978 ;;Hehner, E.C.R., On removing the machine for the language
QuoteRef: hehnEC4_1979 ;;Hehner, E.C.R., do considered od: A contribution to the programming calculus
QuoteRef: hehnEC3_1983 ;;Hehner, E.C.R., Silverberg, B.A., Programming with grammars: an exercise in methodology-directed language design
QuoteRef: hehnEC2_1984 ;;Hehner, E.C.R., Predicative Programming Part 1
QuoteRef: hehnECR10_1990 ;;Hehner, E.C.R., A practical theory of programming
QuoteRef: heidS6_2018 ;;Heidari, S. et al., Scalable graph processing frameworks: a taxonomy and open challenges
QuoteRef: heinDL6_2003 ;;Heine, D.L., Lam, M.S., A practical flow-sensitive and context-sensitive C and C++ memory leak detector
QuoteRef: heinN6_2001 ;;Heintze, N., Tardieu, O., Ultra-fast aliasing analysis using CLA: A million lines of C code in a second
QuoteRef: heinP_1972 ;;Hein, Piet, Grooks 4
QuoteRef: heinS4_2002 ;;Heinz, S. et al., Burst tries: a fast, efficient data structure for string keys
QuoteRef: heisW_1927 ;;Heisenberg, W., Uber den anschaulichen inhalt der quantenttheoretichen kinernatik und mechanik
QuoteRef: heisW_1958 ;;Heisenberg, W., Physics and Philosophy
QuoteRef: heisW_1971 ;;Heisenberg, W., Science and Religion [NewQuotes]
QuoteRef: hekmS9_1986 ;;Hekmatpour, S., Ince, D.C., Forms as a language facility
QuoteRef: hellJM9_2020 ;;Hellerstein, J.M., Alvaro, P., Keeping CALM: when distributed consistency is easy [NewQuotes]
QuoteRef: hellP4_2012 ;;Helland, P., Idempotence is not a medical condition
QuoteRef: hellP2_2017 ;;Helland, P., Life beyond distributed transactions
QuoteRef: hellP11_2020 ;;Helland, P., Data on the outside versus data on the inside [NewQuotes]
QuoteRef: helmH_1857 ;;Helmholtz, H. von, On the physiological causes of harmony in music [OK NewQuotes]
QuoteRef: helmH_1867 ;;von Helmholtz, H., The recent progress of the theory of vision [OK NewQuotes]
QuoteRef: helmH_1870 ;;Helmholtz, H. von, The origin and meaning of geometrical axioms
QuoteRef: helmH3_1878 ;;von Helmholtz, H., The facts of perception (Die Thatsachen in der Wahrnehmung) [NewQuotes]
QuoteRef: hemmD3_1988 ;;Hemmendinger, D., Unfair process scheduling in Modula-2
QuoteRef: hempCG12_1945 ;;Hempel, C.G., On the nature of mathematical truth
QuoteRef: hempCG_1951 ;;Hempel, C.G., Empiricist criteria of cognitive significance: problems and changes
QuoteRef: hendDA7_1986 ;;Henderson, D.A., Jr., Card, S.K., Rooms: The use of multiple virtual workspaces to reduce space contention in a window-based graphical user interface
QuoteRef: hendP9_1975 ;;Henderson, P. et al., The TOPD system
QuoteRef: heniKL1_1980 ;;Heninger, K.L., Specifying software requirements for complex systems: New techniques and the application
QuoteRef: hennJ3_1982 ;;Hennessy, J. et al., Hardware/ Software tradeoffs for increased performance
QuoteRef: hennMA7_1980 ;;Hennell, M.A., Prudom, J.A., A static analysis of the NAG library.
QuoteRef: hennMA3_1984 ;;Hennell, M.A. et al., Assessing a class of software tools
QuoteRef: henrG1_2020 ;;Henry, A., Justin Richer on OAuth [NewQuotes]
QuoteRef: henrG3_2021 ;;Henry, G., Justin Richer on OAuth [NewQuotes]
QuoteRef: henrJ6_2010 ;;Henrich, J. et al., Behavioral and Brain Sciences
QuoteRef: henzMR7_1999 ;;Henzinger, M.R., King, V., Randomized fully dynamic graph algorithms with polylogarithmic time per operation
QuoteRef: henzTA10_2001 ;;Henzinger, T.A. et al., Giotto: A time-triggered language for embedded programming
QuoteRef: henzTA6_2005 ;;Henzinger, T.A. et al., Composable code generation for distributed Giotto
QuoteRef: heppM9_2007 ;;Hepp, M. et al., Harvesting wiki consensus. Using Wikipedia entries as vocabulary for knowledge management
QuoteRef: herhS10_2013 ;;Herhut, S. et al., River trail: A path to parallelism in JavaScript
QuoteRef: herlM10_1982 ;;Herlihy, M., Liskov, B., A value transmission method for abstract data types
QuoteRef: herlM1_1991 ;;Herlihy, M., Wait-free synchronization
QuoteRef: herlM11_1993 ;;Herlihy, M., A methodology for implementing highly concurrent data objects
QuoteRef: herlM10_2002 ;;Herlihy, M. et al., The repeat offender problem: A mechanism for supporting dynamic-sized lock-free data structures
QuoteRef: herlMP7_1990 ;;Herlihy, M.P., Wing, J.M., Linearizability: a correctness condition for concurrent objects
QuoteRef: herrI_2011 ;;Herraiz, I., Hassan, A.E., Beyond lines of code: Do we need more complexity metrics?
QuoteRef: hertM6_2005 ;;Hertz, M. et al., Garbage collection without paging
QuoteRef: hertM10_2005 ;;Hertz, M., Berger, E.D., Quantifying the performance of garbage collection vs. explicit memory management
QuoteRef: hestSD10_1981 ;;Hester, S.D. et al., Using documentation as a software design medium
QuoteRef: heulS6_2016 ;;Heule, S. et al., Stratified synthesis: automatically learning the x86-64 instruction set
QuoteRef: heumST2_2013 ;;Heumann, S.T. et al., The tasks with effects model for safe concurrency
QuoteRef: hewiC8_1977 ;;Hewitt, C., Baker, H., Laws for communicating parallel processes
QuoteRef: hewiC4_1985 ;;Hewitt, C., The challenge of open systems
QuoteRef: hewiC7_1986 ;;Hewitt, C., Offices are open systems
QuoteRef: heydA6_2000 ;;Heydon, A. et al., Caching function calls using precise dependencies
QuoteRef: heydA_2006 ;;Heydon, A. et al., Software Configuration Management using Vesta
QuoteRef: heyeM_1986 ;;Heyer, M., The creative challenge of CD ROM
QuoteRef: hickM9_2000 ;;Hicks, M. et al., Safe and flexible dynamic linking of native code
QuoteRef: hickM6_2001 ;;Hicks, M. et al., Dynamic software updating
QuoteRef: hillMD8_1998 ;;Hill, M.D., Multiprocessors should support simple memory-consistency models
QuoteRef: hillRK11_2019 ;;Hill, R.K., Voting, coding, and the code [NewQuotes]
QuoteRef: hillWD_1985 ;;Hillis, W.D., The Connection Machine
QuoteRef: hillWD12_1986 ;;Hillis, W.D., Steele, G.L., Jr., Data parallel algorithms
QuoteRef: hiltSR7_1985 ;;Hiltz, S.R., Turoff, M., Structuring computer-mediated communication systems to avoid information overload
QuoteRef: hincK9_1998 ;;Hinckley, K. et al., Two-handed virtual manipulation
QuoteRef: hindA5_2016 ;;Hindle, A. et al., On the naturalness of software
QuoteRef: hindM8_2000 ;;Hind, M., Pioli, A., Which pointer analysis should I use?
QuoteRef: hinsK7_2017 ;;Hinsen, K., The power to create chaos
QuoteRef: hinsK11_2018 ;;Hinsen, K., A dream of simplicity: scientific computing on Turing machines
QuoteRef: hinsK3_2020 ;;Hinsen, K., The magic of content-addressable storage [NewQuotes]
QuoteRef: hintG_1984 ;;Hinton, G., Some computational solutions to Bernstein's problems
QuoteRef: hitzP2_2021 ;;Hitzler, P., A review of the semantic web field [NewQuotes]
QuoteRef: hiyyAB_1120 ;;bar Hiyya, Abraham, Hibbur Hameshiha vehatishboret (The treatise on measuring areas and volumes) [NewQuotes]
QuoteRef: hoarCA1_1962 ;;Hoare, C.A.R., QUICKSORT
QuoteRef: hoarCA_1971 ;;Hoare, C.A.R., McKeag, R.M., A survey of store management techniques
QuoteRef: hoarCA_1972 ;;Hoare, C.A.
QuoteRef: hoarCA_1972a ;;Hoare, C.A.R., Proof of correctness of data representations
QuoteRef: hoarCA11_1972 ;;Hoare, C.A.R., Wirth, N., An axiomatic definition of the programming language Pascal
QuoteRef: hoarCA_1973 ;;Hoare, C.A.R., Hints on programming language design
QuoteRef: hoarCA_1973a ;;Hoare, C.A.R., Wirth, N., An axiomatic definition of the programming language PASCAL
QuoteRef: hoarCA10_1973 ;;Hoare, C.A.R., Recursive data structures
QuoteRef: hoarCA_1974 ;;Hoare, C.A.R., Hints on Programming language design
QuoteRef: hoarCA2_1974 ;;Hoare, C.A.R., Lauer, P.E., Consistent and complementary formal theory of the semantics of programming languages
QuoteRef: hoarCA10_1974 ;;Hoare, C.A.R., Monitors: An operating system structuring concept
QuoteRef: hoarCA8_1978 ;;Hoare, C.A.R., Communicating sequential processes
QuoteRef: hoarCA_1985 ;;Hoare, C.A.R., Communicating Sequential Processes
QuoteRef: hoarCA8_1986 ;;Hoare, C.A.R., Mathematics of Programming
QuoteRef: hoarCA8_1987 ;;Hoare, C.A.R. et al., Laws of programming
QuoteRef: hoarCA9_1987 ;;Hoare, C.A.R., An overview of some formal methods for program design
QuoteRef: hobbT_1650 ;;Hobbes, T., Human Nature: Or The fundamental Elements of Policie [OK]
QuoteRef: hobbT_1650a ;;Hobbes, T., De Corpore Politico: or the Elements of Law, Moral and Politic [OK]
QuoteRef: hobbT_1651 ;;Hobbes, T., Leviathan, or the matter, forme, & power of a common-wealth ecclesiasticall and civill [OK]
QuoteRef: hobbT_1655 ;;Hobbes, T., De Corpore, Part 1. Computatio Sive Logica
QuoteRef: hodgS4_2020 ;;Hodges, S. et al., Physical computing: a key element of modern computer science education [NewQuotes]
QuoteRef: hoffCM3_1989 ;;Hoffmann, C.M., The problems of accuracy and robustness in geometric computation
QuoteRef: hoffD7_2000 ;;Hoffman, D., Strooper, P., Prose + Test Cases = Specification
QuoteRef: hoffDM_2001 ;;Hoffman, D.M., Weiss, D.M., Software Fundamentals. Collected Papers of David L. Parnas
QuoteRef: hofsDR_1979 ;;Hofstadter, Douglas R., Godel, Escher, Bach; an Eternal Golden Braid
QuoteRef: hogbD10_1971 ;;Hogben, D. et al., Omnitab II. User's reference manual
QuoteRef: holdD_1965 ;;Holdsworth, D., et. al., User Manual for Leo III: CLEO Specification [NewQuotes]
QuoteRef: hollCM6_2006 ;;Holloway, C.M., Johnson, C.W., Why system safety professionals should read accident reports
QuoteRef: hollGH12_1971 ;;Holloway, G.H., Interpreter/compiler integration in ECL
QuoteRef: holmJ9_2020 ;;Holmes, J. et al., Using relative lines of code to guide automated test generation for Python [NewQuotes]
QuoteRef: holtAW5_1958 ;;Holt, A.W., General purpose programming systems
QuoteRef: holtAW10_1961 ;;Holt, A.W., Program organization and record keeping for dynamic storage allocation
QuoteRef: holtAW11_1966 ;;Holt, A.W., The importance of not treating a computer system as a person
QuoteRef: holtAW3_1967 ;;Holt, A.W., The personification of computers
QuoteRef: holtAW9_1968 ;;Holt, A.W., et. al., Final Report for the INFORMATION SYSTEMS THEORY PROJECT
QuoteRef: holtAW_1970 ;;Holt, A.W., Commoner, F., Events and conditions
QuoteRef: holtAW2_1974 ;;Holt, A.W., The design of a computer-based communication system
QuoteRef: holtAW8_1977b ;;Holt, A.W., Choice and Cause: A formal analysis based on Petri-nets
QuoteRef: holtAW8_1977c ;;Holt, A.W., Concurrency and Choice
QuoteRef: holtAW_1979 ;;Holt A.W., Net models of organizational systems. In theory and practice
QuoteRef: holtAW3_1979 ;;Holt, A.W., Roles and activities. A system for describing systems
QuoteRef: holtAW11_1980 ;;Holt, A.W., A Mathematical Model of continuous discrete behavior
QuoteRef: holtAW11_1981 ;;Holt, A.W., Cashman, P.M., Designing systems to support cooperative activity: An example from software maintenance management
QuoteRef: holtAW5_1983 ;;Holt, A.W. et al., Coordination system technology as the foundation for programming environments
QuoteRef: holtAW_1997 ;;Holt, A.W., Organized activity and its support by computer
QuoteRef: holzGJ2_1988 ;;Holzmann, G.J., An improved protocol reachability analysis technique
QuoteRef: holzGJ5_1997 ;;Holzmann, G.J., The model checker SPIN
QuoteRef: holzGJ5_1999 ;;Holzmann, G.J., Smith, M.H., A practical method for verifying event-driven software
QuoteRef: holzGJ11_2002 ;;Holzmann, G.J., The logic of bugs
QuoteRef: holzGJ6_2006 ;;Holzmann, G.J., The power of 10: Rules for developing safety-critical code
QuoteRef: holzGJ12_2007 ;;Holzmann, G.J., Conquering complexity
QuoteRef: holzGJ8_2008 ;;Holzmann, G.J. et al., Tackling large verification problems with the Swarm tool
QuoteRef: holzGJ12_2008 ;;Holzmann, G.J. et al., Model driven code checking
QuoteRef: holzGJ12_2010 ;;Holzmann, G.J., Scrub: a tool for code reviews
QuoteRef: holzGJ3_2013 ;;Holzmann, G.J., Landing a spacecraft on Mars
QuoteRef: holzGJ2_2014 ;;Holzmann, G.J., Mars code
QuoteRef: holzGJ11_2015 ;;Holzmann, G.J., Out of bounds
QuoteRef: holzGJ1_2017 ;;Holzmann, G.J., The value of doubt [NewQuotes]
QuoteRef: holzGJ1_2021 ;;Holzmann, G.J., Right code [NewQuotes]
QuoteRef: homeM10_2012 ;;Homer, M. et al., Patterns as objects in Grace
QuoteRef: homeM10_2015 ;;Homer, M. et al., From APIs to languages: generalising method names
QuoteRef: honaM11_2012 ;;Honan, M., Kill the password: Why a string of characters can't protect us anymore
QuoteRef: honeSK_1986 ;;Honey, S.K., White, M.S., Cartographic databases
QuoteRef: hongC6_2016 ;;Hong, C. et al., Effective padding of multidimensional arrays to avoid cache conflict misses
QuoteRef: hoobS5_2015 ;;Hoober, S., Fingers, thumbs, and people: Designing for the way users really hold and touch their phones and tablets
QuoteRef: hooiP12_2012 ;;Hooimeijer, P., Weimer, W., StrSolve: solving string constraints lazily
QuoteRef: hookS12_2021 ;;Hooker, S., The hardware lottery [NewQuotes]
QuoteRef: hopfJJ4_1982 ;;Hopfield, J.J., Neural networks and physical systems with emergent collective computational abilities
QuoteRef: hoppG_1946 ;;The staff of the Computation Laboratory, A Manual of Operation for the Automatic Sequence Controlled Calculator
QuoteRef: horiY_1973 ;;Hori, Y. et al., High level language for the generation of telephone switching tasks
QuoteRef: hormK11_2001 ;;Hormann, K., Agathos, A., The point in polygon problem for arbitrary polygons [NewQuotes]
QuoteRef: hornAJ9_2001 ;;Hornof, A.J., Visual search and mouse-pointing in labeled versus unlabeled two-dimensional visual hierarchies
QuoteRef: hornK8_2007 ;;Hornbaek, K., Hertzum, M., Untangling the usability of fisheye menus
QuoteRef: hortMR9_1986 ;;Horton, M.R., How to read the network news
QuoteRef: hortMR10_1986 ;;Horton, M.R., Standard for interchange of USENET messages
QuoteRef: hoshJ7_1998 ;;Hoshen, J., A graph theoretical method for the management and synchronization of large software updates
QuoteRef: hoveD7_2004 ;;Hovemeyer, D., Pugh, W., Finding concurrency bugs in Java
QuoteRef: hoveD12_2004 ;;Hovemeyer, D., Pugh, W., Finding bugs is easy
QuoteRef: howaJH2_1988 ;;Howard, J.H. et al., Scale and Performance in a distributed file system
QuoteRef: howaPG11_1994 ;;Howard, P.G., Vitter, J.S., Design and analysis of fast text compression based on quasi-arithmetic coding
QuoteRef: howdWE12_1989 ;;Howden, W.E., Validating programs without specifications
QuoteRef: howdWE1_1990 ;;Howden, W.E., Comments analysis and programming errors
QuoteRef: howeDR6_2008 ;;Hower, D.R., Hill, M.D., Rerun: exploiting episodes for lightweight memory race recording
QuoteRef: howeJ_2000 ;;Howell, J., End-to-end authorization
QuoteRef: hsiaCH4_2017 ;;Hsiao, C.-H. et al., AsyncClock: scalable inference of asynchronous event causality
QuoteRef: hsiaP11_1993 ;;Hsia, P. et al., Status report: Requirements engineering
QuoteRef: hsieP_2008 ;;Hsieh, P., Hash functions
QuoteRef: huY3_2018 ;;Hu, Y., Neamtiu, I., Static detection of event-based races in android apps
QuoteRef: huanJ6_2014 ;;Huang, J. et al., Maximal sound predictive race detection with control flow abstraction
QuoteRef: huanJ4_2017 ;;Huang, J. et al., Pallas: semantic-aware checking for finding deep bugs in fast path
QuoteRef: huanJC_1977 ;;Huang, J.C., Error detection through program testing
QuoteRef: huanY4_2010 ;;Huang, Y. et al., Detecting bugs in register allocation
QuoteRef: huemM_2016 ;;Huemer, M., Approaching Infinity
QuoteRef: huffDA9_1952 ;;Huffman, D.A., A method for the construction of minimum-redundancy codes
QuoteRef: huffTE_2003 ;;Huff, T.E., The Rise of Early Modern Science: Islam, China, and the West
QuoteRef: huffTE_2011 ;;Huff, T.E., Intellectual Curiosity and the Scientific Revolution
QuoteRef: hughJ_1984 ;;Hughes, J., Why functional programming matters
QuoteRef: hughJA11_1992 ;;Hughes, J.A., Faltering from ethnography to design
QuoteRef: hughV_1127 ;;Hugh of St. Victor, Didascalicon [NewQuotes]
QuoteRef: huiLC11_1993 ;;Hui, L.C.K., Martel, C., Unsuccessful search in self-adjusting data structures
QuoteRef: huiRKW8_1991 ;;Hui, R.K.W. et al., Tacit definition
QuoteRef: hullJJ3_2001 ;;Hull, J.J., Hart, P.E., Toward zero-effort personal document managements
QuoteRef: hullTE9_1988 ;;Hull, T.E. et al., Exception handling in scientific computing
QuoteRef: humeA11_1991 ;;Hume, A., Sunday, D., Fast string searching
QuoteRef: humeD_1739 ;;Hume, D., A Treatise of Human Nature [OK]
QuoteRef: huntA_2000 ;;Hunt, A., Thomas, D., The Pragmatic Programmer
QuoteRef: huntA1_2003 ;;Hunt, A., Thomas, D., The art of enbugging
QuoteRef: huntG6_1977 ;;Hunter, G. et al., The advantages of stream output procedures over format-dominated record transmissions
QuoteRef: huntJG1_1979 ;;Hunt, J.G., Messages in typed languages
QuoteRef: huntJJ4_1998 ;;Hunt, J.J. et al., Delta algorithms: an empirical analysis
QuoteRef: huntJW7_1976 ;;Hunt, J.W., McIlroy, M.D., An algorithm for differential file comparison
QuoteRef: huntS9_1987 ;;Hunting, S., Meeting report
QuoteRef: hurlG2_2018 ;;Hurlburt, G., How much to trust artificial intelligence?
QuoteRef: hursN9_2009 ;;Hurst, N. et al., Review of automatic document formatting
QuoteRef: hustS1_2014 ;;Huston, S. et al., Indexing word sequences for ranked retrieval
QuoteRef: hutcEL_1986 ;;Hutchins, E.L. et al., Direct manipulation interfaces
QuoteRef: huthM_2000 ;;Huth, M., Ryan, M., Logic in Computer Science: Modeling and Reasoning about Systems
QuoteRef: hwanAA3_2012 ;;Hwang, A.A. et al., Cosmic rays don't strike twice: Understanding the nature of DRAM errors and the implications for system design

Related up

ThesaHelp: references a-b
ThesaHelp: references c-d
ThesaHelp: references e-f
ThesaHelp: references g-h
ThesaHelp: references i-l
ThesaHelp: references m-o
ThesaHelp: references p-r
ThesaHelp: references sa-sz
ThesaHelp: references t-z

Updated barberCB 4/23
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber