ThesaHelp: unprocessed references

topic root > Group: all references

all Thesa topics


References with unprocessed quotes. The first group includes one or more processed quotes.


QuoteRef: abdeA6_2018 ;;Abdelkader, A. et al., Sampling conditions for conforming Voronoi meshing by the VoroCrust algorithm
QuoteRef: acarUA6_2018 ;;Acar, U.A. et al., Heartbeat scheduling: provable efficiency for nested parallelism
QuoteRef: adelB_1116 ;;Adelard of Bath, Questiones naturales
QuoteRef: adveSV5_1990 ;;Adve, S.V., Hill, M.D., Weak ordering -- a new definition
QuoteRef: adyaA4_2010 ;;Adya, A. et al., Centrifuge: integrated lease management and partitioning for cloud services
QuoteRef: ahnDH2_2021 ;;Ahn, D.H. et al., Keeping science on keel when software moves
QuoteRef: aikeH11_1937 ;;Aiken, H., Proposed automatic calculating machine
QuoteRef: aitkAC3_1932 ;;Aitken, A.C., On interpolation by iteration of proportional parts, without the use of differences
QuoteRef: alexA_2014 ;;Alexander, A., Infinitesimal: How a dangerous mathematical theory shaped the modern world
QuoteRef: alglJ7_2021 ;;Alglave, J. et al., Armed cats: Formal concurrency modelling at Arm
QuoteRef: aliIM8_2020 ;;Ali, I.M. et al., Foundations, properties, and security applications of puzzles: A survey
QuoteRef: alleRB_2000 ;;Alley, R.B., The Two-Mile Time Machine
QuoteRef: alonRL9_2004 ;;Alonso, R.L., Evolutionary dead ends (or how good ideas that successfully solve problems are not always the way of the future)
QuoteRef: alstMW12_2021 ;;van Alstyne, M.W. et al., 'In Situ' Data Rights
QuoteRef: ambeAH1_2022 ;;Ambe, A.H. et al., From collaborative habituation to everyday togetherness: a long-term study of use of the messaging kettle
QuoteRef: amenN7_2001 ;;Amenta, N. et al., The power crust, unions of balls, and the medial axis transform
QuoteRef: aris_350 ;;Aristotle, Aristotle, Physics
QuoteRef: arnaA_1683 ;;Arnauld, A., Nicole, P., Logic or the Art of Thinking
QuoteRef: arroD11_2020 ;;Arroyuelo, D. et al., Three success stories about compact data structures
QuoteRef: arulJ3_2014 ;;Arulraj, J. et al., Leveraging the short-term memory of hardware to diagnose production-run software failures
QuoteRef: asudA2_2021 ;;Asudeh, A. et al., Scalable signal reconstruction for a broad range of applications
QuoteRef: avic_1097 ;;Avicenna, Avicenna's Deliverance: Logic
QuoteRef: backJ3_2021 ;;Backes, J. et al., One-click formal methods
QuoteRef: bacoR_1266 ;;Bacon, R., Opus Majus [NewQuotes]
QuoteRef: baeJ2_2020 ;;Bae, J. et al., Interactive clustering: a comprehensive review
QuoteRef: baksA3_2016 ;;Baksa, A. et al., Software on a comet: the Philae Lander's central onboard computer
QuoteRef: balaA7_2018 ;;Balazs, A., A comet revisited: lessons learned from Philae's landing
QuoteRef: balmL7_2003 ;;Balmelli, L. et al., Computational analysis of mesh simplification using global error
QuoteRef: bandD9_2007 ;;Bandyopadhyay, D., Snoeyink, J., Almost-delaunay simplices: robust neighbor relations for imprecise 3D points using CGAL
QuoteRef: barbLA10_2018 ;;Barba, L.A., The hard road to reproducibility
QuoteRef: barbLA8_2022 ;;Barba, L.A., Defining the role of open source software in research reproducibility
QuoteRef: baroDW11_2018 ;;Barowy, D.W. et al., ExceLint: automatically finding spreadsheet formula errors
QuoteRef: bartA5_2019 ;;Bartoli, A. et al., Enterprise Wi-Fi: we need devices that are secure by default
QuoteRef: basiA5_2016 ;;Basiri, A. et al., Chaos Engineering
QuoteRef: baudP8_2021 ;;Baudin, P. et al., The dogged pursuit of bug-free C programs: The Frama-C software analysis platform
QuoteRef: bayeD6_1991 ;;Bayer, D. et al., Improving the efficiency and reliability of digital time-stamping
QuoteRef: beauO5_2020 ;;Beaumont, O. et al., Scheduling on two types of resources: A survey
QuoteRef: bertF10_2019 ;;Bertini, F. et al., Can information hiding in social media posts represent a thread?
QuoteRef: bezaJ11_2018 ;;Bezanson, J. et al., Julia: dynamism and performance reconciled by design
QuoteRef: bhatP2_2019 ;;Bhat, P., Dutta, K., A survey of various threats and current state of security in Android platform
QuoteRef: blacS11_2018 ;;Blackshear, S. et al., RacerD: compositional static race detection
QuoteRef: bohmR10_2020 ;;Bohme, R. et al., Responsible vulnerability disclosure in cryptocurrencies
QuoteRef: boisJD6_2000 ;;Boissonnat, J.-D. et al., Triangulations in CGAL
QuoteRef: boorDJ11_1979 ;;Boorstin, D.J., Gresham's law: Knowledge or information? The Center for the Book Viewpoint Series N. 3
QuoteRef: boukA6_2020 ;;Boukerche, A. et al., Outilier detection: methods, models, and classification
QuoteRef: brigC7_2022 ;;Bright, C. et al., When satisfiability solving meets symbolic computation
QuoteRef: browBR_2019 ;;Brown, B.R., The Apollo Chronicles: Engineering America's First Moon Missions
QuoteRef: burgM12_1998 ;;Burgess, M., Computer immunology
QuoteRef: buriJ_1328 ;;Buridan, J., Quaestiones super libris quattuor De caelo et mundo
QuoteRef: campM8_2020 ;;Campbell, M., Putting the passe into passwords: How passwordless technologies are reshaping digital identity
QuoteRef: campNR_1920 ;;Campbell, N.R., Physics, The elements
QuoteRef: cerfVG6_2021 ;;Cerf, V.G., It came from outer space!
QuoteRef: chenH6_2020 ;;Chen, H. et al., A survey on Ethereum systems security: vulnerabilities, attacks, and defenses
QuoteRef: chenJ2_2020 ;;Chen, J. et al., A survey of compiler testing
QuoteRef: chenJ5_2021 ;;Chen, J., He, F., Leveraging control flow knowledge in SMT solving of program verification
QuoteRef: chenMD_1957 ;;Chenu, M.-D., La Theologie au Douzieme Siecle
QuoteRef: cherS4_2020 ;;Cherubin, S., Agosta, G., Tools for reduced precision computation: a survey
QuoteRef: clarKL9_1993 ;;Clarkson, K.L. et al., Four results on randomized incremental constructions
QuoteRef: cochL_1994 ;;Cochrane, L., Adelard of Bath. The first English scientist
QuoteRef: copeBJ_2017 ;;Copeland, B.J., Long, J., Turing and the history of computer music
QuoteRef: cormGV8_2017 ;;Cormack, G.V., Grossman, M.R., Navigating imprecision in relevance assessments on the road to total recall: Roger and me
QuoteRef: craiKJW_1952 ;;Craik, K.J.W., The Nature of Explanation
QuoteRef: crocSD10_2019 ;;Crocker, S.D., The Arpanet and its impact on the state of networking
QuoteRef: crusMR6_2022 ;;Crusoe, M.R. et al., Methods included
QuoteRef: currHB7_1929 ;;Curry, H.B., An analysis of logical substitution
QuoteRef: cusuMA1_2021 ;;Cusumano, M.A., Boeing's 737 Max: A failure of management, not just technology
QuoteRef: cutlA_2012 ;;Cutler, A., Native Listening. Language Experience and the Recognition of Spoken Words
QuoteRef: dacrMF1_2021 ;;Dacrema, M.F. et al., A troubling analysis of reproducibility and progress in recommender systems research
QuoteRef: daloB11_2016 ;;Daloze, B. et al., Efficient and thread-safe objects for dynamically-typed languages
QuoteRef: dantL5_2021 ;;D'Antoni, L., Veanes, M., Automata modulo theories
QuoteRef: daruE3_2017 ;;Darulova, E., Kuncak, V., Towards a compiler for reals
QuoteRef: daviDW_2004 ;;Davies, D.W., Corrections to Turing's universal computing machine
QuoteRef: decaG6_2019 ;;Decaroli, G. et al., A compact index for order-preserving pattern matching
QuoteRef: defrJF6_2022 ;;DeFranco, J.F., Voes, J., Revisting software metrology
QuoteRef: dennPJ2_2021 ;;Denning, P.J., Working set analytics
QuoteRef: dersN5_2021 ;;Dershowitz, N., Viewpoint: Let's be honest
QuoteRef: deviO4_2001 ;;Devillers, O., Teillaud, M., Perturbations for Delaunay and weighted Delaunay 3D triangulations
QuoteRef: dhirS2_2020 ;;Dhir, S., Devi, S.K.A., The use of biometric fingerprints for on-the-fly digital signing of documents
QuoteRef: dietW11_2018 ;;Dietz, W., Adve, V., Software multiplexing: Share your libraries and statically link them too
QuoteRef: dimoC9_2016 ;;Dimoulas, C. et al., Oh lord, please don't let contracts be misunderstood (Functional Pearl)
QuoteRef: diop_250 ;;Diophantus, The Arithmetica
QuoteRef: dolaS6_2018 ;;Dolan, S. et al., Bounding data races in space and time
QuoteRef: douW3_2017 ;;Dou, W. et al., CACheck: detecting and repairing cell arrays in spreadsheets
QuoteRef: drosI4_1971 ;;Drost-Fromm, I., Tompkins, R., Open source community governance the Apache way
QuoteRef: dubrV3_2004 ;;Dubrovsky, V., Toward system principles: General system theory and the alternative approach
QuoteRef: duckGJ6_2018 ;;Duck, G.J., Yap, R.H.C., EffectiveSan: type and memory error detection using dynamically typed C/C++
QuoteRef: dunbRIM_1996 ;;Dunbar, R. I. M., Grooming, gossip, and the evolution of language
QuoteRef: dutiC_2012 ;;Dutilh Novaes, C., Formal Languages in Logic. A philosophical and cognitive analysis
QuoteRef: elliCM4_2000 ;;Ellison, C.M., Naming and certificates
QuoteRef: endrG_2003 ;;Endress, G., Mathematics and philosophy in medieval Islam
QuoteRef: ettrM_2005 ;;Ettrich, M., Designing Qt-style C++ APIs
QuoteRef: eyleD_2017 ;;Eyles, D., Sunburst and Luminary: An Apollo Memoir
QuoteRef: faroS5_2020 ;;Farooqi, S. et al., Measuring and mitigating OAuth access token abuse by collusion networks
QuoteRef: feiS7_2021 ;;Fei, S. et al., Security vulnerabilities of SGX and countermeasures: a survey
QuoteRef: feitAM2_2021 ;;Feit, A.M. et al., AZERTY ameliore: Computational design on a national scale
QuoteRef: feldM7_2020 ;;Feldmann, M. et al., Survey on algorithms for self-stabilizing overlay networks
QuoteRef: floyRW2_1964 ;;Floyd, R.W., Bounded context syntactic analysis
QuoteRef: fogA_2004 ;;Fog, A., Optimizing software in C++. An optimization guide for Windows, Linux, and Mac platforms
QuoteRef: folkM_2016 ;;Folkerts, M., Hughes, B., The Latin mathematics of medieval Europe
QuoteRef: fowlG3_2012 ;;Fowler, G. et al., The FNV non-cryptographic hash algorithm
QuoteRef: funkS8_1999 ;;Funke, S. et al., Structural filtering: a paradigm for efficient and exact geometric programs
QuoteRef: galeC_172 ;;Galenus, C. (Galen), De Methodo Medendi
QuoteRef: galiG_1613 ;;Galilei, G., History and Demonstrations Concerning Sunspots
QuoteRef: galiG12_1613 ;;Galilei, G., Letter to [Benedetto] Castelli
QuoteRef: galiG12_1615 ;;Galilei, G., Letter to the Grand Duchess Christiana
QuoteRef: gangG8_2021 ;;Gange, G. et al., A fresh look at zones and octagons
QuoteRef: gausCF_1870 ;;Gauss, C.F., Disquisitiones Arithmeticae
QuoteRef: gebaM3_2018 ;;Gebai, M., Degenais, M.R., Survey and analysis of kernel and userspace tracers on Linux: design, implementation, and overhead
QuoteRef: gehaA12_2021 ;;Gehani, A. et al., Digging into big provenance (with SPADE)
QuoteRef: genkD6_2016 ;;Genkin, D. et al., Physical key extraction attacks on PCs
QuoteRef: gentG_1932 ;;Gentzen, G., Uber die existenz unabhangiger aiomensysteme zu unendlichen satzsystem
QuoteRef: gentG_1935 ;;Gentzen, G., Untersuchungen uber das logische Schliessen
QuoteRef: gentG_1936 ;;Gentzen, G., Die widerspruchsfreiheit der reinen zahlentheorie
QuoteRef: gentG_1938 ;;Gentzen, G., Neue fassung des widerspruchsfreiheitsbeweises fur die reine Zahlentheorie
QuoteRef: gentG_1938a ;;Gentzen, G., Die gegenwartige large in der mathematischen grundlagenforschung
QuoteRef: getoV8_2021 ;;Getov, V., Insights into the origins of the IEEE Computer Society and the invention of electronic digital computing
QuoteRef: geweFL5_2021 ;;Gewers, F.L. et al., Principal component analysis: a natural approach to data exploration
QuoteRef: giesF_1994 ;;Gies, F., Gies, J., Cathedral, Forge, and Waterwheel: Technology and invention in the Middle Ages
QuoteRef: gimpJ_1976 ;;Gimpel, J., The Medieval Machine: The Industrial Revolution of the Middle Ages
QuoteRef: gleiM10_2019 ;;Gleirscher, M. et al., New opportunities for integrated formal methods
QuoteRef: godbM2_2020 ;;Godbolt, M., Optimizations in C++ compilers
QuoteRef: goldHH_1972 ;;Goldstine, H.H., The Computer: from Pascal to von Neumann
QuoteRef: goodB8_2017 ;;Goodwin, B. et al., BitFunnel: revisiting signatures for search
QuoteRef: goodN_1956 ;;Goodman, N. et al., A world of individuals
QuoteRef: goroN1_2019 ;;Gorogiannis, N. et al., A true positives theorem for a static race detector
QuoteRef: grahG6_2018 ;;Grahne, G., Moallemi, A., A useful four-valued database logic
QuoteRef: grahL_2009 ;;Graham, L., Kantor, J.-M., Naming Infinity: A True Story of Religious Mysticism and Mathematical Creativity
QuoteRef: granE_2001 ;;Grant, E., God and Reason in the Middle Ages
QuoteRef: grasH_1844 ;;Grassmann, H., Die Lineale Ausdehnungslehre, ein neuer Zweig der Mathematik ...
QuoteRef: grosE5_2021 ;;Grosse, E. et al., Implementing insider defenses
QuoteRef: guR10_2019 ;;Gu, R. et al., Building certified concurrent OS kernels
QuoteRef: guevM2_2021 ;;Guevara, M. et al., Differential privacy: The pursuit of protections by default
QuoteRef: guilC_1148 ;;Guillaume de Conches (William of Conches), Dragmaticon Philosophiae
QuoteRef: haecE_1876 ;;Haeckel, E., Anthropogenie: oder, Entwicklungsgeschichte des Menschen
QuoteRef: haecE_1900 ;;Haeckel, E., The Riddle of the Universe, at the close of the nineteenth century
QuoteRef: hamiM_2019 ;;Hamilton, M., In their own words: Margaret Hamilton on her daughter's simulation
QuoteRef: hammJ7_2022 ;;Hammer, J., Reig, S., From individual rights to community obligations: a Jewish approach to speech
QuoteRef: hammRW_1991 ;;Hamming, R.W., The art of probability--for scientists and engineers
QuoteRef: hareD10_2021 ;;Harel, D. et al., Scenario-based algorithmics: coding algorithms by automatic composition of separate concerns
QuoteRef: hartDR_1949 ;;Hartree, D.R., Calculating Instruments and Machines
QuoteRef: harvW_1628 ;;Harvey, W., Harvey, W., Exercitatio Anatomica de Motu Cordis et Sanguinis in Animalibus
QuoteRef: harvW_1649 ;;Harvey, W., Harvey, W., Exercitatio Anatomica de circulatione Sanguinis
QuoteRef: harvW5_1936 ;;Harvey, W.
QuoteRef: haskCH_1957 ;;Haskins, C.H., The Renaissance of the Twelfth Century
QuoteRef: hegeGW_1812 ;;Hegel, G.W.F., Wissenschaft der Logik
QuoteRef: heisW_1971 ;;Heisenberg, W., Science and Religion
QuoteRef: hellJM9_2020 ;;Hellerstein, J.M., Alvaro, P., Keeping CALM: when distributed consistency is easy
QuoteRef: hellP11_2020 ;;Helland, P., Data on the outside versus data on the inside
QuoteRef: helmH_1857 ;;Helmholtz, H. von, On the physiological causes of harmony in music
QuoteRef: helmH_1867 ;;von Helmholtz, H., The recent progress of the theory of vision
QuoteRef: helmH3_1878 ;;von Helmholtz, H., The facts of perception (Die Thatsachen in der Wahrnehmung)
QuoteRef: henrG1_2020 ;;Henry, A., Justin Richer on OAuth
QuoteRef: henrG3_2021 ;;Henry, G., Justin Richer on OAuth
QuoteRef: hillRK11_2019 ;;Hill, R.K., Voting, coding, and the code
QuoteRef: hinsK3_2020 ;;Hinsen, K., The magic of content-addressable storage
QuoteRef: hitzP2_2021 ;;Hitzler, P., A review of the semantic web field
QuoteRef: hiyyAB_1120 ;;bar Hiyya, Abraham, Hibbur Hameshiha vehatishboret (The treatise on measuring areas and volumes)
QuoteRef: hodgS4_2020 ;;Hodges, S. et al., Physical computing: a key element of modern computer science education
QuoteRef: holdD_1965 ;;Holdsworth, D., et. al., User Manual for Leo III: CLEO Specification
QuoteRef: holmJ9_2020 ;;Holmes, J. et al., Using relative lines of code to guide automated test generation for Python
QuoteRef: holzGJ1_2017 ;;Holzmann, G.J., The value of doubt
QuoteRef: holzGJ1_2021 ;;Holzmann, G.J., Right code
QuoteRef: hookS12_2021 ;;Hooker, S., The hardware lottery
QuoteRef: hormK11_2001 ;;Hormann, K., Agathos, A., The point in polygon problem for arbitrary polygons
QuoteRef: hughV_1127 ;;Hugh of St. Victor, Didascalicon
QuoteRef: isidS_600 ;;Isidore of Seville, The Quadrivium
QuoteRef: ivanD10_2017 ;;Ivanchykhin, D. et al., Regular and almost universal hashing: an efficient implementation
QuoteRef: jakoM5_2019 ;;Jakobsson, M., The rising thread of launchpad attacks
QuoteRef: jevoWS_1869 ;;Jevons, W.S., The Substitution of Similars, The true principle of reasoning, derived from a modification of Aristotle's dictum
QuoteRef: jevoWS_1887 ;;Jevons, W.S., The Principles of Science: A treatise on logic and scientific method
QuoteRef: jinH8_2021 ;;Jin, H. et al., Lean privacy review: Collecting users' privacy concerns of data practices at a low cost
QuoteRef: johnS_1159 ;;John of Salisbury, Metalogicon
QuoteRef: johnS_1250 ;;John of Sacrobosco, Algorismus Vulgaris
QuoteRef: jordWC_1996 ;;Jordan, W.C., The Great Famine: Northern Europe in the Early Fourteenth Century
QuoteRef: joveRP12_2020 ;;Jover, R.P., Security analysis of SMS as a second factor of authentication
QuoteRef: jungR4_2021 ;;Jung, R. et al., Safe systems programming in Rust
QuoteRef: kakhAM7_2019 ;;Kakhki, A.M. et al., Taking a long look at QUIC
QuoteRef: kaneU7_20 ;;Kanewala, U., Chen, T.Y., Metamorphic testing: a simple yet effective approach for testing scientific software
QuoteRef: katzJJ_1981 ;;Katz, J.J., Language and other abstract objects
QuoteRef: kayJ_2015 ;;Kay, J., Other People's Money: the real business of finance
QuoteRef: kellS11_2016 ;;Kell, S. et al., The missing link: explaining ELF static linking, semantically
QuoteRef: kellT9_2020 ;;Kelly, T., Is persistent memory persistent?
QuoteRef: kettL5_2008 ;;Kettner, L. et al., Classroom examples of robustness problems in geometric computations
QuoteRef: keynJM_1921 ;;Keynes, J.M., A Treatise on Probability
QuoteRef: kietP7_2021 ;;Kietzmann, P. et al., A guideline on pseudorandom number generation (PRNG) in the IoT
QuoteRef: killT3_2021 ;;Killalea, T., A second conversation with Werner Vogels
QuoteRef: klemB_2009 ;;Klemens, B., Modeling with data: tools and techniques for scientific computing
QuoteRef: klepM5_2019 ;;Kleppmann, M. et al., Online event processing
QuoteRef: knowD_1962 ;;Knowles, D., The Evolution of Medieval Thought
QuoteRef: kochP7_2020 ;;Kocher, P. et al., Spectre attacks: exploiting speculative execution
QuoteRef: krisS8_2020 ;;Krishnamurthi, S., Fisler, K., Data-Centricity: a challenge and opportunity for computing education
QuoteRef: ksheN9_2020 ;;Kshetri, N., DeFranco, J.F., The economics of cyberattacks on Brazil
QuoteRef: kuniP_2003 ;;Kunizsch, P., The transmission of Hindu-Arabic numerals reconsidered
QuoteRef: labbK_1000 ;;Labban, K. ibn, Kitab fi usul hisab al-hind
QuoteRef: laplP9_2020 ;;Laplante, P., A brief history of software professionalism and the way forward
QuoteRef: laplPS_1825 ;;Laplace, P.-S.], Essai Philosophique sur les Probabilites
QuoteRef: lattC3_2020 ;;Lattner, C. et al., arXiv:2002.11054v2
QuoteRef: leeJ11_2018 ;;Lee, J. et al., Reconciling high-level optimizations and low-level code in LLVN
QuoteRef: leibGW3_1603 ;;Leibnitz, G.W., Leibnitz's reply to the extract from the letter of M. Foucher, Canon of Dijon, published in the "Journal" of March 16, 1693
QuoteRef: leibGW9_1679 ;;Leibniz, G.W., letter to Huygens from Hannover (with enclosed essay)
QuoteRef: leitL11_2019 ;;Leite, L. et al., A survey of devops concepts and challenges
QuoteRef: lemiD4_2018 ;;Lemire, D. et al., Roaring bitmaps: implementation of an optimized software library
QuoteRef: leviP_2005 ;;Levis, P. et al., TinyOS: An operating system for sensor networks
QuoteRef: lewiB11_2020 ;;Lewis, B., Vogel, D., Longer delays in rehearsal-based interfaces increase expert use
QuoteRef: liG4_2020 ;;Li, G. et al., A survey of renamings of software entities
QuoteRef: liliY10_2019 ;;Lilis, Y., Savidis, A., A survey of metaprogramming languages
QuoteRef: lionJ_1977 ;;Lions, J., A Commentary on the Unix Operating System
QuoteRef: lippM6_2020 ;;Lipp, M. et al., Meltdown: reading kernel memory from user space
QuoteRef: liuBL3_2019 ;;Liu, B.L. et al., Rethinking incremental and parallel pointer analysis
QuoteRef: liuL8_2021 ;;Liu, L. et al., Safe-by-default concurrency for modern programming languages
QuoteRef: lockD7_2018 ;;Locke, D., Zuccon, G., A test collection for evaluating legal case law search
QuoteRef: lockLL_1923 ;;Locke, L.L., The Ancient Quipu or Peruvian Knot Record
QuoteRef: loffM8_2007 ;;Loffler, M., van Kreveld, M., Largest bounding box, smallest diameter, and related problems on imprecise points
QuoteRef: lombP_1158 ;;Lombard, P., The Sentences
QuoteRef: loveAO_1936 ;;Lovejoy, A.O., The Great Chain of Being. A study of the history of an idea
QuoteRef: lozaRC6_2019 ;;Lozano, R.C., Schulte, C., Survey on combinatorial register allocation and instruction scheduling
QuoteRef: luJ6_2019 ;;Lu, J., Holubova, I., Multi-model databases: a new journey to handle the variety of data
QuoteRef: luenEA5_2021 ;;Luengo, E.A., Villalba, L.J.G., Recommendations on statistical randomness test batteries for cryptographic purposes
QuoteRef: luoS8_2020 ;;Luo, S. et al., Scalable linear algebra on a relational database system
QuoteRef: luriAR_1972 ;;Luria, A.R., The History of a Brain Wound: The Man with a Shattered World [ExtraQuote]
QuoteRef: lyonJ6_1949 ;;Lyons, J. & Company, A Non-Technical Description of E.D.S.A.C. How the Cambridge Electronic Calculator works
QuoteRef: maY6_2019 ;;Ma, Y. et al., WiFi sensing with channel state information: A survey
QuoteRef: machE_1883 ;;Mach, E., The Science of Mechanics
QuoteRef: madsOL_1993 ;;Madsen, O.L. et al., Object-Oriented Programming in the Beta Programming Language
QuoteRef: magaA3_2021 ;;Magalhaes, A. et al., Main memory database recovery: A survey
QuoteRef: mahaP5_2011 ;;Mahajan, P. et al., Consistency, availability, and convergence
QuoteRef: mahoP6_1945 ;;Mahon, P., History of hut 8 to December 1941
QuoteRef: maitS11_2020 ;;Maity, S. et al., BodyWire-HCI: Enabling new interaction modalities by communicating strictly dring touch using electro-quasistatic human body communication
QuoteRef: maliJS10_2016 ;;Malik, J.S., Hemani, A., Gaussian random number generation: a survey on hardware architectures
QuoteRef: mannE6_2019 ;;Mannes, E., Maziero, C., Naming content on the network layer: a security analysis of the information-centric network model
QuoteRef: mansY12_2017 ;;Mansouri, Y. et al., Data storage management in cloud environments: taxonomy, survey, and future directions
QuoteRef: margG6_2014 ;;Margaritis, G., Anastasiadis, S.V., Incremental text indexing for fast disk-based search
QuoteRef: martG8_2018 ;;Marton, G., Porkolab, Z., Selective friends in C++
QuoteRef: martJA8_2021 ;;Martin, J. A. A., Gollee, H., Intermittent control as a model of mouse movements
QuoteRef: mashAJ4_2017 ;;Mashtizadeh, A.J. et al., Towards practical default-on multi-core record/replay
QuoteRef: masmM7_2004 ;;Masmano, M. et al., TLSF: a new dynamic memory allocator for real-time systems
QuoteRef: mathU11_2018 ;;Mathur, U. et al., What happens-after the first race? enhancing the predictive power of happens-before based dynamic race detection
QuoteRef: mattMD6_2004 ;;Mattson, M.D. et al., Eutrophication and Aquatic Plant Management of Massachusetts. Final Generic Environmental Impact Report
QuoteRef: maucJW1_1947x ;;Mauchly, J. W., Preparation of problems for EDVAC-type machines
QuoteRef: mayeR2_2020 ;;Mayer, R., Jacobsen, H.-A., Scalable deep learning on distributed infrastructures: challenges, techniques, and tools
QuoteRef: maziD7_2002 ;;Mazieres, D., Shasha, D., Building secure file systems out of Byzantine storage
QuoteRef: mcclSC_1998 ;;McCluskey, S.C., Astronomies and Cultures in Early Medieval Europe
QuoteRef: mcgiC_2015 ;;McGinn, C., Philosophy of Language. The Classics Explained
QuoteRef: mcgiJ_2010 ;;McGinnis, J., Avicennan infinity: a select history of the infinite through Avicenna
QuoteRef: mehlK11_2011 ;;Mehlhorn, K. et al., A general approach to the analysis of controlled perturbation algorithms
QuoteRef: melaYY_2018 ;;Melamed, Y.Y., "A substance consisting of an infinity of attributes": Spinoza on the infinity of attributes
QuoteRef: memaK1_2019 ;;Memarian, K. et al., Exploring C semantics and pointer provenance
QuoteRef: mercRT6_2021 ;;Mercuri, R.T., Neumann, P.G., The risks of election believability (or lack thereof)
QuoteRef: meyeB_2010 ;;Meyer, B. et al., Avoid a void: The eradication of null dereferencing
QuoteRef: millJS_1843x ;;Mill, J.S., A System of Logic Ratiocinative and Inductive. Being a Connected View of the Principles of Evidence and the Methods of Scientific Investigation
QuoteRef: mira10_2004 ;;MIRA Limited, MISRA-C:2004. Guidelines for the use of the C language in critical systems
QuoteRef: miraE11_1999 ;;Miranda, E., Context management in VisualWorks 5i
QuoteRef: moffA8_2019 ;;Moffat, A., Huffman coding
QuoteRef: moffA7_2020 ;;Moffat, A., Petri, M., Large-alphabet semi-static entropy coding via asymmetric numeral systems
QuoteRef: mohaC3_1992 ;;Mohan, C. et al., ARIES: A transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging
QuoteRef: mokhA9_2018 ;;Mokhov, A. et al., Build systems a la carte
QuoteRef: monaF8_2022 ;;Monaco, F., Color blind accessibility manifesto
QuoteRef: mooeCN9_1947 ;;Mooers, C.N., Putting Probability to work in coding punched cards -- Zatocoding
QuoteRef: mooeCN_1948 ;;Mooers, C.N., Application of random codes to the gathering of statistical information
QuoteRef: moorAW_2019 ;;Moore, A.W., The Infinite
QuoteRef: morlSG_1947 ;;Morley, S.G., The ancient Maya
QuoteRef: morrJC10_1977 ;;Morrison, J.C., Philosophy and history in Bacon
QuoteRef: moseJ6_1970 ;;Moses, J., The function of FUNCTION in LISP or Why the FUNARG problem should be called the environment problem
QuoteRef: mossA12_2018 ;;Moss, A. et al., C.forAll.: Adding modern programming language features to C
QuoteRef: mottL10_2018 ;;Mottola, L., Whitehouse, K., Fundamental concepts of reactive control for autonomous drones
QuoteRef: mounM9_2019 ;;Mountantonakis, M., Tzitzikas, Y., Large-scale semantic integration of linked data: a survey
QuoteRef: mulaW7_2018 ;;Mula, W., Lemire, D., Faster base64 encoding and decoding using AVX2 instructions
QuoteRef: munsJP10_1994 ;;Munson, J.P., Dewan, P., A flexible object merging framework
QuoteRef: muraFU4_2017 ;;Muram, F.U. et al., Systematic review of software behavioral model consistency checking
QuoteRef: murrA_1978 ;;Murray, A., Reason and Society in the Middle Ages
QuoteRef: nachO_2018 ;;Nachtomy, O., Winegar, R., Introduction: infinity in early modern philosophy
QuoteRef: naraA12_2017 ;;Narayanan, A., Clark, J., Bitcoin's academic pedigree
QuoteRef: nashD1_2018 ;;Nashat, D., Amer, A.A., A comprehensive taxonomy of fragmentation and allocation techniques in distributed database design
QuoteRef: navaG9_2020 ;;Navarro, G., Rojas-Ledesma, J., Predecessor search
QuoteRef: navaG2_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part II: Compressed indexes
QuoteRef: navaG3_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part I: Repetitiveness measures
QuoteRef: neweA10_1977 ;;Newell, A. et al., L*: an interactive symbolic implementation system
QuoteRef: newtI_1707 ;;Newton, I., Arithmetica Universalis : sive de compositione et resolutione arithmetica liber
QuoteRef: nguyK3_2018 ;;Nguyen, K. et al., Skyway: connecting managed heaps in distributed big data systems
QuoteRef: nienK11_2016 ;;Nienhuis, K. et al., An operational semantics for C/C++11 concurrency
QuoteRef: nourIR9_2021 ;;Nourbakhsh, I.R., AI ethics: A call to faculty
QuoteRef: nuneD11_2016 ;;Nunez, D. et al., Prioritized garbage collection: explicit GC support for software caches
QuoteRef: ocalR8_2020 ;;O'Callahan, R. et al., To catch a failure: The record-and-replay approach to debugging
QuoteRef: ockhW_1323f ;;Ockham, William of, Summa totius logicae
QuoteRef: ockhW_1324 ;;Ockham, W., Quodlibeta Septem
QuoteRef: oderM10_2005 ;;Odersky, M., Zenger, M., Scalable component abstractions
QuoteRef: ogasT10_1995 ;;Ogassawara, T., An algorithm with constant execution time for dynamic storage allocation
QuoteRef: oheaP2_2019 ;;O'Hearn, P., Separation logic
QuoteRef: ongaD6_2014 ;;Ongaro, D., Ousterhout, J., In search of an understandable consensus algorithm
QuoteRef: oreJP2_2021 ;;Ore, J.-P. et al., An empirical study on type annotations: Accuracy, speed, and suggestion effectiveness
QuoteRef: oresN_1355 ;;Oresme, N., Tractatus de configurationibus qualitatum et motuum
QuoteRef: oresN_1370 ;;Oresme, N., De Causis Mirabilium
QuoteRef: orouL10_2020 ;;O'Rourke, L., et al, The Philae lander reveals low-strength primitive ice inside cometary boulders
QuoteRef: osteE7_2021 ;;Osterweil, E., A cybersecurity terminarch: Use it before we lose it
QuoteRef: ottJ2_2021 ;;Ott, J. et al., BioScript: programming safe chemistry on laboratories-on-a-chip
QuoteRef: oustJ7_2018 ;;Ousterhout, J., Always measure one level deeper
QuoteRef: ozI3_2019 ;;Oz, I., Arslan, S., A survey of multithreading alternatives for soft error fault tolerance
QuoteRef: paghR10_2013 ;;Pagh, R. et al., How to approximate a set without knowing its size in advance
QuoteRef: paicCD8_1996 ;;Paice, C.D., Method for evaluation of stemming algorithms based on error counting
QuoteRef: palmJ2_1982 ;;Palme, J., Uses of the SIMULA process concept
QuoteRef: pandC_1075 ;;Pandulf of Capua, Liber de Calculatione
QuoteRef: pannF10_2005 ;;Panneton, F., L'Ecuyer, P., On the xorshift random number generators
QuoteRef: panwA3_2018 ;;Panwar, A. et al., Making huge pages actually useful
QuoteRef: papaG3_2020 ;;Papadakis, G. et al., Blocking and filtering techniques for entity resolution: a survey
QuoteRef: papaS2_2018 ;;Papadimitriou, S., Moussiades, L., Mac OS versus FreeBSD: a comparative evaluation
QuoteRef: pariR_2017 ;;Parikh, R., Renero, A., Justified true belief: Plato, Gettier, and Turing
QuoteRef: parnDL5_2021 ;;Parnas, D.L., Software engineering: a profession in waiting
QuoteRef: patiR2_2019 ;;Patil, R., Modi, C., An exhaustive survey on security concerns and solutions at different components of virtualization
QuoteRef: paulW_1952 ;;Pauli, W., Der einflub archetypischer vorstellungen auf die bildung naturwissenschaftlicher theorien bei Kepler
QuoteRef: paulW_1954 ;;Pauli, W., Pauli, W., Phenomenon and physical reality. Introduction to a symposium
QuoteRef: pearDJ4_21 ;;Pearce, D.J., A lightweight formalism for reference lifetimes and borrowing in Rust
QuoteRef: peirCS11_1877 ;;Peirce, C.S., The fixation of belief
QuoteRef: peirCS11_1887 ;;Peirce, C.S., Logical machines
QuoteRef: pellV_2007 ;;Pellatt, V., Numbers and Numeracy in Chinese Culture, Language, and Education: The social substratum of the development of mathematical thinking
QuoteRef: pereP_1269 ;;Peregrinus, P. (Pierre de Maricourt), Epistle of Petrus Peregrinus of Maricourt, to Sygerus of Foucaucourt, soldier, concerning the magnet
QuoteRef: peteS6_2010 ;;Peter, S. et al., Design principles for end-to-end multicore schedulers
QuoteRef: petrM4_2018 ;;Petri, M., Moffat, A., Compact inverted index storage using general-purpose compression libraries
QuoteRef: pibiGE4_2017 ;;Pibiri, G.E., Venturini, R., Clustered elias-fano indexes
QuoteRef: pibiGE8_2017 ;;Pibiri, G.E., Venturini, R., Efficient data structures for massive n-gram datasets
QuoteRef: pibiGE2_2019 ;;Pibiri, G.E., Venturini, R., Handling massive n-gram datasets efficiently
QuoteRef: pirkP7_2010 ;;Pirkelbauer, P. et al., Design and evaluation of C++ open multi-methods
QuoteRef: plat_360 ;;Plato, Timaeus
QuoteRef: plat_375 ;;Plato, The Republic
QuoteRef: plot_270 ;;Plotinus, Enneads
QuoteRef: poinH_1891 ;;Poincare, H., Les geometries non Euclidiennes
QuoteRef: poinH_1898 ;;Poincare, H., On the foundations of geometry
QuoteRef: poloM_1299 ;;Polo, M., The Travels
QuoteRef: postEL7_1921 ;;Post, E.L., Introduction to a general theory of elementary propositions
QuoteRef: postEL_1936 ;;Post, E.L., Finite combinatory processes. Formulation 1.
QuoteRef: postEL_1941 ;;Post, E.L., Absolutely unsolvable problems and relatively undecidable propositions. Account of an anticipation
QuoteRef: poweB6_2019 ;;Powers, B. et al., Mesh: compacting memory management for C/C++ applications
QuoteRef: preuTB2_2022 ;;Preuber, T.B. et al., Everything you always wanted to know about embedded trace
QuoteRef: prokA2_2018 ;;Prokopec, A., Cache-tries: concurrent lock-free hash tries with constant-time operations
QuoteRef: ptolK_150 ;;Ptolemaios, K., Geographike hyphegesis (Guide to Drawing a World Map)
QuoteRef: puenJPB9_2017 ;;Puente, J.P.B., Persistence for the masses: RRB-Vectors in a systems language
QuoteRef: puliO9_2017 ;;Pulido-Prieto, O., Juarez-Martinez, U., A survey of naturalistic programming techniques
QuoteRef: pullJM_1968 ;;Pullan, J.M., The History of the Abacus
QuoteRef: putnH_1965 ;;Putnam, H., A philosopher looks at quantum mechanics
QuoteRef: putnH10_1973 ;;Putnam, H., Philosophy and our mental life
QuoteRef: putnH_1974 ;;Putnam, H., The 'corroboration' of theories
QuoteRef: putnH_1975 ;;Putnam, H., The meaning of 'meaning'
QuoteRef: putnH_2015 ;;Putnam, H. et al., Reply to Ian Hacking
QuoteRef: quinV8_2007 ;;Quint, V., Vatton, I., Editing with style
QuoteRef: quinWV_1960 ;;Quine, W.V.O., Word and Object
QuoteRef: rabiMO4_1959 ;;Rabin, M.O., Scott, D., Finite automata and their decision problems
QuoteRef: ragaJ1_2018 ;;Ragan-Kelly, J. et al., Halide: decoupling algorithms from schedules for high-performance image processing
QuoteRef: ramaGM1_2015 ;;Rama, G.M., Kak, A., Some structural measures of API usability
QuoteRef: recoR_1543 ;;Recorde, R., The Grounde of Artes
QuoteRef: recoR_1557 ;;Recorde, R., The Whetstone of Witte
QuoteRef: reevJW9_1992 ;;Reeves, J.W., What is software design
QuoteRef: reghF2_2019 ;;Feghenzani, F. et al., The real-time Linux kernel: A survey on PREEMPT_RT
QuoteRef: reihP6_1994 ;;Reiher, P. et al., Resolving file conflicts in the Ficus file system
QuoteRef: richE_1178 ;;Richard of Ely, Dialogue concerning the Exchequer
QuoteRef: riehRD1_2021 ;;Riehle, R.D., Michael, J.B., Improving the trustworthiness of software through rigorous data type design
QuoteRef: riemB_1854 ;;Riemann, B., On the hypotheses that lie at the foundations of geometry
QuoteRef: riggM3_2018 ;;Rigger, M. et al., An analysis of x86-64 inline assembly in C programs
QuoteRef: riskJ_2016 ;;Riskin, J., The Restless Clock. A history of the centuries-long argument over what makes living things tick.
QuoteRef: robiA_1963 ;;Robinson, A., Introduction to model theory and the metamathematics of algebra
QuoteRef: roetFJ_1941 ;;Roethlisberger, F.J., Dickson, W.J., Management and the worker: An account of a research program conducted by the Western Electric Company, Hawthorne Works, Chicago
QuoteRef: roetFJ_1949 ;;Roethlisberger, F.J. et al., Management and the Worker. An Account of a Research Program Conducted by the Western Electric Company, Hawthorne Works, Chicago
QuoteRef: romeM5_2018 ;;Romero, M., My users taught me to read with my ears
QuoteRef: rompT10_2010 ;;Rompf, T., Odersky, M., Lightweight modular staging: A pragmatic approach to runtime code generation and compiled DSLs
QuoteRef: roseR_1991 ;;Rosen, R., Life Itself: A comprehensive inquiry into the nature, origin, and fabrication of life
QuoteRef: rotmB_1993x ;;Rotman, B., Ad Infiinitum: The Ghost in Turing's Machine
QuoteRef: ruprA3_2018 ;;Ruprecht, A. et al., VM live migration at scale
QuoteRef: russB7_1908 ;;Russell, B., Mathematical logic as based on the theory of types
QuoteRef: russB_1938 ;;Russell, B., Principles of Mathematics
QuoteRef: rybn1_2021 ;;, Human perceptron
QuoteRef: ryzhL4_2008 ;;Ryzhyk, L. et al., Dingo: taming device drivers
QuoteRef: samaM11_2016 ;;Samak, M. et al., Directed synthesis of failing concurrent executions
QuoteRef: sancF_1581 ;;Sanches, F., Quod nihil scivur
QuoteRef: sandRS2_1996 ;;Sandu, R.S. et al., Role-based access control models
QuoteRef: santRCM6_2018 ;;Santos, R.C.M. et al., A memory-bounded, deterministic and terminating semantics for the synchronous programming language Ceu
QuoteRef: sapiE_1921 ;;Sapir, E., Language: An introduction to the study of speech
QuoteRef: satyM8_1989 ;;Satyanarayanan, M., Integrating security in a large distributed system
QuoteRef: sausF_1916 ;;de Saussure, F., Cours de linguistique generale
QuoteRef: savoT5_2016 ;;Savor, T. et al., Continuous deployment at Facebook and OANDA
QuoteRef: sayeDL_1941 ;;Sayers, D.L., The Mind of the Maker
QuoteRef: schlT7_2021 ;;Schlossnagle, T. et al., Always-on time-series database: keeping up where there's no way to catch up
QuoteRef: schw7_2010 ;;Schwegman, J., The "system" as a reading technology: Pedagogy and philosophical criticism in Condillac's Traite des systemes
QuoteRef: schwJI10_1969 ;;Schwartz, J.I., Analyzing large-scale system development
QuoteRef: scotE9_2010 ;;Scott, E., Johnstone, A., GLL parsing
QuoteRef: scotJD_1300 ;;Scotus, J.D., Ordinatio I
QuoteRef: scotJD_1300a ;;Duns Scotus, J., Concerning Metaphysics
QuoteRef: scotJD_1300b ;;Duns Scotus, J., Man's Natural Knowledge of God
QuoteRef: scotJD_1300c ;;Duns Scotus, J., The existence of God
QuoteRef: scotJD_1300d ;;Duns Scotus, J., The unicity of God
QuoteRef: scotJD_1301 ;;Scotus, J.D., Lectura I
QuoteRef: scotJD_1302 ;;Scotus, J.D., Reportatio IA (personally examined and corrected report of Scotus' questions on book 1 of Peter's Sentences, Paris, France)
QuoteRef: scotJD_1306 ;;Scotus, J.D., Quodlibet
QuoteRef: sculZ1_2017 ;;Scully, Z., Chlipala, A., A program optimization for automatic database result caching
QuoteRef: seacRC4_2017 ;;Seacord, R.C., Uninitialized reads
QuoteRef: seldJP_1980 ;;Seldin, J.P., Curry's Program
QuoteRef: sethA_2021 ;;Seth, A., Being You
QuoteRef: shapM1_2011 ;;Shapiro, M. et al., A comprehensive study of convergent and commutative replicated data types
QuoteRef: sherC_1953 ;;Sherrington, C., Man on His Nature
QuoteRef: shiX1_2018 ;;Shi, X. et al., Graph processing on GPUs: a survey
QuoteRef: shreB5_2020 ;;Shrestha, B., Lin, H., Data-centric edge computing to defend power grids against IoT-based attacks
QuoteRef: shuR10_2016 ;;Shu, R. et al., A study of security isolation techniques
QuoteRef: siedJ_2006 ;;Siedersleben, J., Errors and exceptions -- rights and obligations
QuoteRef: sierF5_2020 ;;Sierra-Arriaga, F. et al., Security issues and challenges for virtualization technologies
QuoteRef: singAK4_2017 ;;Singh, A.K. et al., A survey and comparative study of hard and soft real-time dynamic resource allocation strategies for multi-/many-core systems
QuoteRef: singJ9_2016 ;;Singh, J., Gupta, V., Text stemming: approaches, applications, and challenges
QuoteRef: siskJE_1985 ;;Sisk, J.E., VarArsdale, S., Exploring the PICK Operating System
QuoteRef: sjobDIK5_1994 ;;Sjoberg, D.I.K. et al., Thesaurus-based software environments
QuoteRef: smitD9_2016 ;;Smite, D., van Solingen, R., What's the true hourly cost of offshoring?
QuoteRef: soetQD4_2017 ;;Soetens, Q.D. et al., Changes as first-class citizens: a research perspective on modern software tooling
QuoteRef: soloA12_2018 ;;Solovyev, A. et al., Rigorous estimation of floating-point round-off errors with symbolic Taylor expansions
QuoteRef: soloY10_2013 ;;Solodkyy, Y. et al., Open pattern matching for C++
QuoteRef: sousN_2015 ;;Sousanis, N., Unflattening
QuoteRef: speeRD8_1969 ;;Speer, R.D., Strict control kept out semiconductor flaws
QuoteRef: speiM3_2022 ;;Speicher, M., We need to get rid of significance in A/B testing, seriously!
QuoteRef: srbaI7_2016 ;;Srba, I., Bielikova, M., Why is Stack Overflow failing?
QuoteRef: sridM8_2009 ;;Sridharan, M., Fink, S.J., The complexity of Andersen's analysis in practice
QuoteRef: stacZ2_2020 ;;Stachniak, Z., Learning from prototypes
QuoteRef: steeE11_2017 ;;Steel, E. et al., Hootsuite: in pursuit of reactive systems
QuoteRef: stevS_1586 ;;Stevin, S, Anhang van de Weeghconst
QuoteRef: stevS_1605 ;;Stevin, S., Van den Hemelloop
QuoteRef: stewI_2017 ;;Stewart, I., Infinity: A Very Short Introduction
QuoteRef: stieT_1985 ;;Stiefel, T., The Intellectual Revolution in Twelfth-Century Europe
QuoteRef: stilJ_2018 ;;Stillwell, J., Reverse Mathematics. Proofs from the Inside Out
QuoteRef: stirAMB_1922 ;;Stirling, A.M.W., William De Morgan and his wife
QuoteRef: streM_2020 ;;Strevens, M., The Knowledge Machine
QuoteRef: sturC8_2020 ;;Sturton, C. et al., FinalFilter: asserting security properties of a processor at runtime
QuoteRef: suT10_2016 ;;Su, T. et al., A survey of data-flow testing
QuoteRef: suchFM5_2007 ;;Suchanek, F.M. et al., YAGO: a core of semantic knowledge unifying WordNet and Wikipedia
QuoteRef: sunC11_2016 ;;Sun, C. et al., Finding compiler bugs via live code mutation
QuoteRef: sunK6_2019 ;;Sun, K. et al., Exploring low-occlusion qwerty soft keyboard using spatial landmarks
QuoteRef: sunY2_2018 ;;Ferizovic, D., Belloch, G.epsilon., PAM: parallel augmented maps
QuoteRef: sunY6_2021 ;;Sun, Y. et al., Securing internet applications from routing attacks
QuoteRef: swanDR4_1986 ;;Swanson, D.R., Undiscovered public knowledge
QuoteRef: swoyC_1994 ;;Swoyer, C., Leibniz's calculus of real addition
QuoteRef: tarhJ12_2017 ;;Tarhio, J. et al., Technology beats algorithms (in exact string matching)
QuoteRef: terrDB9_1994 ;;Terry, D.B. et al., Session guarantees for weakly consistent replicated data
QuoteRef: thilM12_2019 ;;Thilakaratne, M. et al., A systematic review of literature-based discovery: general overview, methodology, & statistical analysis
QuoteRef: thorM7_2017 ;;Thorup, M., Fast and powerful hashing using tabulation
QuoteRef: thorRM_2014 ;;Thorson, R.M., Walden's Shore. Henry David Thoreau and Nineteenth-Century Science
QuoteRef: tobiS1_2008 ;;Tobin-Hochstadt, S., Felleisen, M., The design and implementation of Typed Scheme
QuoteRef: toroN7_2014 ;;Toronto, N., McCarthy, J., Practically accurate floating-point math
QuoteRef: treviso_1478 ;;Smith, D.E. (translator), Treviso Arithmetic of 1478
QuoteRef: tripA12_2004 ;;Tripathy, A. et al., Distributed balanced tables: a new approach
QuoteRef: trumI10_2017 ;;Trummer, I., Koch, C., Multi-objective parametric query optimization
QuoteRef: turiAM_1946 ;;Turing, A.M., Letter from Turing to W. Ross Ashby
QuoteRef: turiAM_1951 ;;Turing, A.M., Intelligent machinery, a heretical theory
QuoteRef: turiAM2_1951 ;;Turing, A.M., Undated letter from Turing to Michael Woodger at the National Physical Laboratory
QuoteRef: turiAM5_1951 ;;Turing, A.M., Can digital computers think?
QuoteRef: turiAM1_1952 ;;Turing, A.M. et al., Can automatic calculating machines be said to think?
QuoteRef: tzimG6_2021 ;;Tzimpragos, G. et al., In-sensor classification with boosted race trees
QuoteRef: urbaJ7_2019 ;;Urbano, J. et al., Statistical significance testing in information retrieval: an empirical analysis of type I, type II, and type III errors
QuoteRef: vachP1_2021 ;;Vachon, P., The identity in everyone's pocket
QuoteRef: vandB1_1996 ;;Vander Zanden, B., An incremental algorithm for satisfying hierarchies of multiway dataflow constraints
QuoteRef: verbJ3_20 ;;Verbraeken, J. et al., A survey on distributed machine learning
QuoteRef: vermR2_2015 ;;Verma, R. et al., Failure-atomic updates of application data in a Linux file system
QuoteRef: viglSD9_2014 ;;Viglas, S.D., Write-limited sorts and joins for persistent memory
QuoteRef: vilkJ11_2020 ;;Vilk, J., Berger, E.D., Bleak*: automatically debugging memory leaks in web applications
QuoteRef: viotP6_2016 ;;Viotti, P., Vukolic, M., Consistency in non-transactional distributed storage systems
QuoteRef: vollM6_2019 ;;Vollmer, M. et al., LoCal: a language for programs operating on serialized data
QuoteRef: vrviN6_2017 ;;Vrvilo, N. et al., A marshalled data format for pointers in relocatable data blocks
QuoteRef: waghS2_2021 ;;Wagh, S. et al., DP-cryptography: marrying differential privacy and cryptography in emerging applications
QuoteRef: walcK7_2012 ;;Walcott-Justice, K. et al., THeME: a system for testing by hardware monitoring events
QuoteRef: wallAR_1891 ;;Wallace, A.R., Darwinism. An exposition of the Theory of Natural Selection with some of its Applications
QuoteRef: wallJ_1656 ;;Wallis, J., Arithmetica infinitorum
QuoteRef: wangK4_2017 ;;Wang, K. et al., Graspan: a single-machine disk-based graph system for intraprocedural static analysis of large-scale systems code
QuoteRef: wangK3_2018 ;;Wang, K. et al., Hop, skip, &jump
QuoteRef: wangS3_2018 ;;Wang, S. et al., Understanding and auto-adjusting performance-sensitive configurations
QuoteRef: wangZ11_2018 ;;Wang, Z. et al., Using local clocks to reproduce concurrency bugs
QuoteRef: warfJS6_2020 ;;Warford, J.S. et al., A calculational deductive system for linear temporal logic
QuoteRef: wattC1_2018 ;;Watt, C., Mechanising and verifying the WebAssembly specification
QuoteRef: weisHI_2014 ;;Weisberg, H.I., Willful Ignorance: The Mismeasure of Uncertainty
QuoteRef: wenH2_2018 ;;Wen, H., Interval-based memory reclamation
QuoteRef: wessC_1797 ;;Wessel, C., On the analytical representation of direction. An attempt. Applied chiefly to the solution of plane and spherical polygons
QuoteRef: whatR_1857 ;;Whately, R., Bacon's Essays: with Annotations
QuoteRef: wheeDJ6_2005 ;;Wheeler, D.J., Needham, R.M., TEA, a tiny encryption algorithm
QuoteRef: whorBL4_1940 ;;Whorf, B.L., Science and linguistics
QuoteRef: whorBL_1941 ;;Whorf, B.L., The Relation of habitual thought and behavior to language
QuoteRef: whorBL2_1941 ;;Whorf, B.L., A brotherhood of thought: Linguistics
QuoteRef: whorBL4_1941 ;;Whorf, B.L., Languages and logic
QuoteRef: whorBL_1942 ;;Whorf, B.L., Decipherment of the linguistic portion of the Maya hieroglyphs
QuoteRef: whorBL_1950 ;;Whorf, B.L., An American Indian model of the universe
QuoteRef: whorBL_1953 ;;Whorf, B.L., Linguistic factors in the terminology of Hopi architecture
QuoteRef: wickSB10_2017 ;;Wicker, S.B., Karlsson, K., Internet advertising: technology, ethics, and a serious difference of opinion
QuoteRef: wickSB5_2020 ;;Wicker, S.B., Ghosh, D., Reading in the panopticon -- Your Kindle may be spying on you, but you can't be sure
QuoteRef: wilcJR2_2018 ;;Wilcox, J.R. et al., VerifiedFT: a verified, high-performance precise dynamic race detector
QuoteRef: wilhR3_2020 ;;Wilhelm, R., Determining reliable and precise execution time bounds of real-time software
QuoteRef: wingJM10_2021 ;;Wing, J.M., Trustworthy AI
QuoteRef: wintJ7_2011 ;;Winther, J., Guarded type promotion
QuoteRef: wintPH_2017 ;;Winston, P.H., On computing machinery and intelligence
QuoteRef: wolfHB11_2017 ;;Wolfe, H.B., The mobile phone as surveillance device: progress, perils, and protective measures
QuoteRef: wolfT_2016 ;;Wolfe, T., The Kingdom of Speech
QuoteRef: wyclJ_1368 ;;Wyclif, J., Tractatus de Universalibus
QuoteRef: xieC10_2015 ;;Xie, C. et al., High-performance ACID via modular concurrency control
QuoteRef: xionH6_2019 ;;Xiong, H. et al., A survey of group key agreement protocols with constant rounds
QuoteRef: xuH9_2021 ;;Xu, H. et al., Memory-safety challenge considered solved? An in-depth study of all Rust CVEs
QuoteRef: xuanJ1_2019 ;;Xuan, J. et al., A survey of Bayesian nonparametric learning
QuoteRef: yangC8_2016 ;;Yang, C. et al., Hierarchical program paths
QuoteRef: yangK5_2016 ;;Yang, K. et al., A2: analog malicious hardware
QuoteRef: yangK9_2017 ;;Yang, K. et al., Exploiting the analog properties of digital circuits for malicious hardware
QuoteRef: yapCK1_1997 ;;Yap, C.-K., Towards exact geometric computation
QuoteRef: yoonY5_2015 ;;Yoon, Y., Myers, B.A., Supporting selective undo in a code editor
QuoteRef: younAL7_2017 ;;Young, A.L., Yung, M., Cryptovirology: the birth, neglect, and explosion of ransomware
QuoteRef: yuJ12_2021 ;;Yu, J. et al., Speculative taint tracking (STT): A comprehensive protection for speculatively accessed data
QuoteRef: yueS10_2021 ;;Yue, S., Katabi, D., Liquid testing with your smartphone
QuoteRef: zahaM4_2012 ;;Zaharia, M. et al., Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing
QuoteRef: zaniC3_1982 ;;Zaniolo, C., Database relations with null values
QuoteRef: zappF11_2018 ;;Zappa Nardelli, F. et al., Julia subtyping: a rational reconstruction
QuoteRef: zhanC3_2021 ;;Zhang, C. et al., Understanding deep learning (still) requires rethinking generalizations
QuoteRef: zhanI10_2015 ;;Zhang, I. et al., Building consistent transactions with inconsistent replication
QuoteRef: zhanL3_2018 ;;Zhang, L. et al., Analysis of SSL certificate reissues and revocations in the wake of Heartbleed
QuoteRef: zhanQ6_2017 ;;Zhang, Q. et al., Skeletal program enumeration for rigorous compiler testing
QuoteRef: zhanT4_2017 ;;Zhang, T. et al., ProRace: practical data race detection for production use
QuoteRef: zhaoJ10_2006 ;;Zhao, J. et al., Cardinality computing: a new step towards fully representing multi-sets by Bloom filters
QuoteRef: zhaoM9_2018 ;;Zhao, M. et al., Emotion recognition using wireless signals
QuoteRef: zhuX11_2015 ;;Zhu, X. et al., An analysis of programming language statement frequency in C, C++, and Java source code
QuoteRef: zobeJ_2014 ;;Zobel, J., Writing for Computer Science

Updated barberCB 5/23

Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber