Map
Index
Random
Help
Group
Notes
Related
th

ThesaHelp: references m-o

topic root > Group: all references


--related--
all references
references a-b
references c-d
references e-f
references g-h
references i-l
references m-o
references p-r
references sa-sz
references t-z

--referenced--
all Thesa topics

Summary

Quotation references starting with 'm', 'n', or 'o'.

Group members up

QuoteRef: maY6_2019 ;;Ma, Y. et al., WiFi sensing with channel state information: A survey [NewQuotes]
QuoteRef: macfAGJ8_2003 ;;MacFarlane, A.G.J., Information, knowledge and the future of machines
QuoteRef: machB3_1992 ;;Machrone, B., Time for a new interface
QuoteRef: machD_2014 ;;MacHale, D., The Life and Work of George Boole. A prelude to the digital age
QuoteRef: machE_1883 ;;Mach, E., The Science of Mechanics [NewQuotes]
QuoteRef: mackIS4_1993 ;;MacKenzie, I.S., Ware, C., Lag as a determinant of human performance in interactive systems
QuoteRef: mackIS5_1997 ;;MacKenzie, I.S., Zhang, S.X., The immediate usability of Graffiti
QuoteRef: mackIS5_1999 ;;MacKenzie, I.S., Zhang, S.X., The design and evaluation of a high-performance soft keyboard
QuoteRef: mackRL7_1983 ;;Mack, R.L. et al., Learning to use word processors: Problems and prospects
QuoteRef: mackWE10_1988 ;;Mackay, W.E., Diversity in the use of electronic mail: A preliminary inquiry
QuoteRef: maclA5_1989 ;;MacLean, A. et al., Design rationale: The argument behind the artifact
QuoteRef: maclBJ12_1982 ;;MacLennan, B.J., Values and objects in programming languages
QuoteRef: maclBJ12_1983 ;;MacLennan, B.J., Abstraction in the Intel iAPX-432 prototype systems implementation language
QuoteRef: maclBJ_1987 ;;MacLennan, B.J., Principles of programming languages
QuoteRef: maclIA11_1977 ;;Macleod, I.A., Design and implementation of a display oriented text editor
QuoteRef: macqD7_2002 ;;MacQueen, D., Should ML be object-oriented
QuoteRef: madsOL10_1986 ;;Madsen, O.L., Block structure and object oriented languages.
QuoteRef: madsOL_1993 ;;Madsen, O.L. et al., Object-Oriented Programming in the Beta Programming Language [NewQuotes]
QuoteRef: maesJW10_2000 ;;Maessen, J.-W. et al., Improving the Java memory model using CRF
QuoteRef: maesP12_1987 ;;Maes, P., Concepts and experiments in computational reflection
QuoteRef: magaA3_2021 ;;Magalhaes, A. et al., Main memory database recovery: A survey [NewQuotes]
QuoteRef: magaJP9_2011 ;;Magalhaes, J.P., de Haas, W.B., Functional modeling of musical harmony
QuoteRef: maglA2_2015 ;;Maglo, A. et al., 3D mesh compression: survey, comparisons, and emerging trends
QuoteRef: maguS_1993 ;;Maguire, S., Writing Solid Code
QuoteRef: mahaP5_2011 ;;Mahajan, P. et al., Consistency, availability, and convergence [NewQuotes]
QuoteRef: mahaP12_2011 ;;Mahajan, P. et al., Depot: Cloud storage with minimal trust
QuoteRef: mahoP6_1945 ;;Mahon, P., History of hut 8 to December 1941 [NewQuotes]
QuoteRef: maieD1_1986 ;;Maier, D. et al., Displaying database objects
QuoteRef: mairH9_2013 ;;Mairson, H., Functional geometry and the Traite de Lutherie
QuoteRef: maitS11_2020 ;;Maity, S. et al., BodyWire-HCI: Enabling new interaction modalities by communicating strictly dring touch using electro-quasistatic human body communication [NewQuotes]
QuoteRef: malaD10_2009 ;;Malayeri, D., Aldrich, J., CZ: multiple inheritance without diamonds
QuoteRef: malcM12_1983 ;;Malcolm, M., Dyment, D., Experience designing the Waterloo Port user interface
QuoteRef: maliJS10_2016 ;;Malik, J.S., Hemani, A., Gaussian random number generation: a survey on hardware architectures [NewQuotes]
QuoteRef: malkM3_2015 ;;Malka, M. et al., rIOMMU: Efficient IOMMU for I/O devices that employ ring buffers
QuoteRef: maloTW6_1982 ;;Malone, T.W., How do people organize their desks? Implications for the design of office information systems
QuoteRef: maloTW4_1987 ;;Malone, T.W. et al., Semistructured messages are surprisingly useful for computer-supported coordination
QuoteRef: maloTW5_1987 ;;Malone, T.W. et al., Intelligent information-sharing systems
QuoteRef: maloTW11_1992 ;;Malone, T.W. et al., Experiments with Oval: a radically tailorable tool for cooperative work
QuoteRef: maloTW3_1994 ;;Malone, T.W., Crowston, K., The interdisciplinary study of coordination
QuoteRef: malpG9_2000 ;;Malpohl, G. et al., Renaming detection
QuoteRef: mamrSA5_1987 ;;Mamrak, S.A. et al., A software architecture for supporting the exchange of electronic manuscripts
QuoteRef: manbU10_1990 ;;Manber, U., Chain reactions in networks
QuoteRef: manbU10_1993 ;;Manber, U., Wu, S., GLIMPSE: A tool to search through entire file systems
QuoteRef: manbU1_1997 ;;Manber, U. et al., WebGlimpse--Combining browsing and searching
QuoteRef: manbU4_1997 ;;Manber, U., A text compression scheme that allows fast searching directly in the compressed file
QuoteRef: manbU8_2000 ;;Manber, U. et al., Experience with personalization on Yahoo!
QuoteRef: mandBB_1983 ;;Mandelbrot, B.B., The fractal geometry of nature
QuoteRef: maneS6_1987 ;;Manes, S., Hypertext: A breath of air freshener
QuoteRef: mannE6_2019 ;;Mannes, E., Maziero, C., Naming content on the network layer: a security analysis of the information-centric network model [NewQuotes]
QuoteRef: mannT5_1994 ;;Mann, T. et al., A coherent distributed file cache with directory write-behind
QuoteRef: mannZ5_1978 ;;Manna, Z., Waldinger, R., The logic of computer programming
QuoteRef: mannZ7_1979 ;;Manna, Z., Waldinger, R., Synthesis: dreams => programs
QuoteRef: manoY5_1994 ;;Manolopoulos, Y., Lorentzos, N., Performance of linear hashing schemes for primary key retrieval
QuoteRef: mansJ1_2005 ;;Manson, J. et al., The Java memory model
QuoteRef: mansY12_2017 ;;Mansouri, Y. et al., Data storage management in cloud environments: taxonomy, survey, and future directions [NewQuotes]
QuoteRef: mantMJ2_1983 ;;Manthey, M.J., Moret, B.M.E., The computational metaphor and quantum physics
QuoteRef: manuSB_1986 ;;Manufacturing Studies Board et al., Towards a New Era in U.S. Manufacturing
QuoteRef: maoJ4_2016 ;;Mao, J. et al., RID: finding reference count bugs with inconsistent path pair checking
QuoteRef: maoTW10_1979 ;;Mao, T.W., Yeh, R.T., Communication port: a language concept for concurrent programming
QuoteRef: maoTW3_1980 ;;Mao, T.W., Yeh, R.T., Communication port: a language concept for concurrent programming
QuoteRef: maquJ_1968 ;;Maquarrie, J., Martin Heidegger
QuoteRef: maraH10_1997 ;;Marais, H., Bharat, K., Supporting cooperative and personal surfing with a desktop assistant
QuoteRef: marcG1_1988 ;;Marchionini, A., Shneiderman, B., Finding facts vs. browsing knowledge in hypertext systems
QuoteRef: marcM1_1974 ;;Marcotty, M., Schutz, H., The systems programming language, Malus
QuoteRef: margG6_2014 ;;Margaritis, G., Anastasiadis, S.V., Incremental text indexing for fast disk-based search [NewQuotes]
QuoteRef: mariB5_1996 ;;Maring, B., Object-oriented development of large applications
QuoteRef: markA4_2016 ;;Markuze, A. et al., True IOMMU protection from DMA attacks: when copy is faster than zero copy
QuoteRef: markG6_2002 ;;Mark, G., Extreme collaboration
QuoteRef: markHM_1963 ;;Markowitz, H.M. et al., Simscript: a simulation programming language
QuoteRef: markV6_1982 ;;Markstein, V. et al., Optimization of range checking
QuoteRef: markW1_1981 ;;Mark, W., Use of database organization in the Consul system
QuoteRef: markW_1982 ;;Mark, W., Natural-language help in the Consul system
QuoteRef: marlS6_2001 ;;Marlow, S. et al., Asynchronous exceptions in Haskell
QuoteRef: marlS9_2004 ;;Marlow, S., Jones, S.P., Making a fast curry: Push/enter vs. eval/apply for higher-order languages
QuoteRef: marnPA12_1973 ;;de Marneffe, P.-A., Holon programming
QuoteRef: marrK3_2013 ;;Marriott, K. et al., HTML automatic table layout
QuoteRef: marsA5_1984 ;;Marshack, A., Hierarchical evolution of the human capacity: the paleolithic evidence
QuoteRef: martAP_1990 ;;Martinich, A.P., The Philosophy of Language
QuoteRef: martC3_1998 ;;Martinez, C., Roura, S., Randomized binary search trees
QuoteRef: martF3_1998 ;;Martin, F. et al., Analysis of loops
QuoteRef: martG8_2018 ;;Marton, G., Porkolab, Z., Selective friends in C++ [NewQuotes]
QuoteRef: martJ_1975 ;;Martin, J., Computer data-base organization
QuoteRef: martJA8_2021 ;;Martin, J. A. A., Gollee, H., Intermittent control as a model of mouse movements [NewQuotes]
QuoteRef: martJJ12_1973 ;;Martin, J.J., The 'Natural' set of basic control structures
QuoteRef: martJJ_1980 ;;Martin, J.J., FAD, a functional programming language that supports abstract data types
QuoteRef: martJMR8_1997 ;;Martin, J.M.R., Welch, P.H., A design strategy for deadlock-free concurrent systems
QuoteRef: martL6_1986 ;;Martin, L., "Eskimo words for snow": A case study in the genesis and decay of an anthropological example
QuoteRef: martM10_2005 ;;Martin, M. et al., Finding application errors and security flaws using PQL: a program query language
QuoteRef: martMJ_1974 ;;Martin, M.J., Generalized structured programming
QuoteRef: martP12_1966 ;;Martin-Lof, Per, The definition of random sequences
QuoteRef: martP1_1986 ;;Martin, P., Tsichritzis, D., Complete logical routings in computer mail systems
QuoteRef: martRC7_2005 ;;Martin, R.C., The test bus imperative: architectures that support automated acceptance testing
QuoteRef: martRC5_2007 ;;Martin, R.C., Professionalism and test-driven development
QuoteRef: maryF_1982 ;;Maryanski, F., Data-server design issues
QuoteRef: mashAJ4_2017 ;;Mashtizadeh, A.J. et al., Towards practical default-on multi-core record/replay [NewQuotes]
QuoteRef: mashJ1_2009 ;;Mashey, J., The long road to 64 bits
QuoteRef: mashJR_1976 ;;Mashey, J.R., Using a command language as a high-level programming language
QuoteRef: mashJR_1976a ;;Mashey, J.R., Smith, D.W., Documentation tools and techniques
QuoteRef: masmM7_2004 ;;Masmano, M. et al., TLSF: a new dynamic memory allocator for real-time systems [NewQuotes]
QuoteRef: massH10_1987 ;;Massalin, H., Superoptimizer--A look at the smallest program
QuoteRef: mastL10_2015 ;;Mastrangelo, L. et al., Use at your own risk: The Java unsafe API in the wild
QuoteRef: mathU11_2018 ;;Mathur, U. et al., What happens-after the first race? enhancing the predictive power of happens-before based dynamic race detection [NewQuotes]
QuoteRef: matiE4_1993 ;;Matias, E. et al., Half-QWERTY: A one-handed keyboard facilitating skill transfer from QWERTY
QuoteRef: matsND10_2014 ;;Matsakis, N.D. et al., Typed objects in JavaScript
QuoteRef: mattMD6_2004 ;;Mattson, M.D. et al., Eutrophication and Aquatic Plant Management of Massachusetts. Final Generic Environmental Impact Report [NewQuotes]
QuoteRef: matuHR_1980 ;;Maturana, H.R., Varela F.J., Autopoiesis and cognition. The realization of the living
QuoteRef: matyV2_2008 ;;Matyas, V. et al., Authorizing card payments with PINs
QuoteRef: matzD9_1997 ;;Matzke, D., Will physical scalability sabotage performance gains?
QuoteRef: maucJW1_1947 ;;Mauchly, J.W., Preparation of problems for EDVAC-type machines
QuoteRef: maucJW1_1947x ;;Mauchly, J. W., Preparation of problems for EDVAC-type machines [NewQuotes]
QuoteRef: maurB11_2015 ;;Maurer, B., Fail at scale
QuoteRef: maurPM3_2004 ;;Maurer, P.M., Metamorphic programming: unconventional high performance
QuoteRef: maviA8_2009 ;;Mavin, A. et al., EARS (Easy Approach to Requirements Syntax)
QuoteRef: maviA9_2010 ;;Mavin, A., Wilkinson, P., Big EARS (The return of "Easy Approach to Requirements Syntax")
QuoteRef: maxwJC_1864 ;;Maxwell, J.C., A dynamical theory of the electromagnetic field [OK]
QuoteRef: maxwJC_1891 ;;Maxwell, J.C., A Treatise on Electricity and Magnetism [OK]
QuoteRef: mayD_1987 ;;May, D. et al., Communicating process architecture: transputers and Occam
QuoteRef: mayeR2_2020 ;;Mayer, R., Jacobsen, H.-A., Scalable deep learning on distributed infrastructures: challenges, techniques, and tools [NewQuotes]
QuoteRef: maysD5_2002 ;;Mays, D., LeBlanc, R.J., Jr., The CycleFree methodology: a simple approach to building reliable, robust, real-time systems
QuoteRef: maziD7_2002 ;;Mazieres, D., Shasha, D., Building secure file systems out of Byzantine storage [NewQuotes]
QuoteRef: mcarG10_2002 ;;McArthur, G. et al., An extensible tool for source code representation using XML
QuoteRef: mcauAJ2_1994 ;;McAuley, A.J., Weighted sum codes for error detection and their comparison with existing codes
QuoteRef: mcbrDK7_1985 ;;McBride, D.K. et al., The development of a standardized, computer-based abbreviation algorithm
QuoteRef: mccaJ_1960 ;;McCarthy, J., Recursive functions of symbolic expressions and their computation by machines
QuoteRef: mccaJ4_1960 ;;McCarthy, J., Recursive functions of symbolic expressions and their computation by machines
QuoteRef: mccaJ8_1962 ;;McCarthy, J., Towards a mathematical science of computation
QuoteRef: mccaJ7_1963 ;;McCarthy, J. et al., The linking segment subprogram language and linking loader
QuoteRef: mccaJ_1969 ;;McCarthy, J., Hayes, P.J., Some philosophical problems from the standpoint of artificial intelligence
QuoteRef: mcclSC_1998 ;;McCluskey, S.C., Astronomies and Cultures in Early Medieval Europe [NewQuotes]
QuoteRef: mccoS7_1996 ;;McConnell, S., Daily build and smoke test
QuoteRef: mccoS7_1998 ;;McConnell, S., Why you should use routines ... routinely
QuoteRef: mccrDD_1981 ;;McCracken, D.D., A maverick approach to systems analysis and design
QuoteRef: mccrDD4_1982 ;;McCracken, D.D., Jackson, M.A., Life cycle concept considered harmful
QuoteRef: mccrDL10_1984 ;;McCracken, D.L., Akscyn, R.M., Experience with the ZOG human-computer interface system
QuoteRef: mccuWS_1943 ;;McCulloch, W.S., Pitts, W., A logical calculus of the ideas immanent in nervous activity
QuoteRef: mccuWS_1951 ;;McCulloch, W.S., Why the mind is in the head
QuoteRef: mcdeDV9_1975 ;;McDermott, D.V., Very large Planner-type data bases
QuoteRef: mcdeJ8_1995 ;;McDermott, J., Goldschlag, D., Storage jamming
QuoteRef: mcgiC_2015 ;;McGinn, C., Philosophy of Language. The Classics Explained [NewQuotes]
QuoteRef: mcgiJ_2010 ;;McGinnis, J., Avicennan infinity: a select history of the infinite through Avicenna [NewQuotes]
QuoteRef: mcgoCL_1979 ;;McGowan, C.L., McHenry, R.C., Software Management
QuoteRef: mcgoMJ7_1983 ;;McGowan, M.J., Anderson, W.L., Software must move! A description of the software assembly line
QuoteRef: mcgrJR1_1979 ;;McGraw, J.R., Andrews, G.R., Access control in parallel programs
QuoteRef: mcilMD10_1968 ;;McIlroy, M.D., "Mass produced" software components
QuoteRef: mcilMD7_1978 ;;McIlroy, M.D. et al., UNIX time-sharing system: Foreword
QuoteRef: mcilMD1_1982 ;;McIlroy, M.D., Development of a spelling list
QuoteRef: mcilMD8_1992 ;;McIlroy, M.D., Reeds, J.A., Multilevel security in the UNIX tradition
QuoteRef: mcilPM1_1993 ;;McIlroy, P.M. et al., Engineering radix sort
QuoteRef: mcinDB8_1991 ;;McIntyre, D.B., Mastering J
QuoteRef: mcinS5_2011 ;;McIntosh, S. et al., An empirical study of build maintenance effort
QuoteRef: mcjoPR1_1989 ;;McJones, P.R., Swart, G.F., Evolving the UNIX system interface to support multithreaded programs
QuoteRef: mckeBJ2_1990 ;;McKenzie, B.J. et al., Selecting a hashing algorithm
QuoteRef: mckeP5_2011 ;;McKenzie, P., Weapons of mass assignment
QuoteRef: mckePE7_2013 ;;McKenney, P.E., Structured deferral: synchronization via procrastination
QuoteRef: mckeRM5_1984 ;;McKeag, R.M. et al., Designing software for children
QuoteRef: mckeWM_1966 ;;McKeeman, W.M., An approach to computer language design
QuoteRef: mckeWM_1970 ;;McKeeman, W.M. et al., A compiler generator
QuoteRef: mckeWM_1974 ;;McKeeman, W.M., Programming language design
QuoteRef: mckeWM_1975 ;;McKeeman, W.M., Mechanizing bankers' morality
QuoteRef: mckuK3_2010 ;;McKusick, K., Quinlan, S., GFS: Evolution on fast-forward
QuoteRef: mckuMK8_1984 ;;McKusick, M.K. et al., A fast file system for UNIX
QuoteRef: mckuMK6_1999 ;;McKusick, M.K., Ganger, G.R., Soft updates: a technique for eliminating most synchronous writes in the fast filesystem
QuoteRef: mcleDJ3_1976 ;;Mclead, D.J., High-level domain definition in a relational data-base system
QuoteRef: mcleJ1_1990 ;;McLean, J., The specification and modeling of computer security
QuoteRef: mcleSG5_1998 ;;McLellan, S.G. et al., Building more usable APIs
QuoteRef: mcmuT11_2015 ;;McMullen, T., It Probably Works
QuoteRef: mcphJ_1974 ;;McPhee, J., The curve of binding energy
QuoteRef: mcquD5_1975 ;;McQuillan, D., Transaction diagrams-- a design tool
QuoteRef: meadCA6_1997 ;;Mead, C.A., Collective electrodynamics I
QuoteRef: meawF10_2012 ;;Meawad, F. et al., Eval Begone! Semi-automated removal of eval from JavaScript programs
QuoteRef: medeA10_2016 ;;Medeiros, A., Dynamics of change: why reactivity matters
QuoteRef: medeO9_2009 ;;Medelyan, O. et al., Mining meaning from Wikipedia
QuoteRef: meekB9_1994 ;;Meek, B., A taxonomy of datatypes
QuoteRef: meerL_1978 ;;Meertens, L., Program text and program structure
QuoteRef: megiN4_2004 ;;Megiddo, N., Modha, D.S., Outperforming LRU with an adaptive replacement cache algorithm
QuoteRef: mehlK11_2011 ;;Mehlhorn, K. et al., A general approach to the analysis of controlled perturbation algorithms [NewQuotes]
QuoteRef: mehtR8_1997 ;;Mehta, R. et al., Techniques for low energy software
QuoteRef: meijE10_2002 ;;Meijer, E., Szyperski, C., Overcoming independent extensibility challenges
QuoteRef: meijE4_2011 ;;Meijer, E., Bierman, G., A co-relational model of data for large shared data banks
QuoteRef: meikS4_2016 ;;Meiklejohn, S. et al., A fistful of Bitcoins: Characterizing payments among men with no names
QuoteRef: melaYY_2018 ;;Melamed, Y.Y., "A substance consisting of an infinity of attributes": Spinoza on the infinity of attributes [NewQuotes]
QuoteRef: meliN_1986 ;;Melin, N., The new Alexandria: CD ROM in the library
QuoteRef: melnS6_2011 ;;Melnik, S. et al., Dremel: interactive analysis of web-scale datasets
QuoteRef: memaK6_2016 ;;Memarian, K. et al., Into the depths of C: elaborating the de facto standards
QuoteRef: memaK1_2019 ;;Memarian, K. et al., Exploring C semantics and pointer provenance [NewQuotes]
QuoteRef: memorex ;;Memorex, Computer System Products, MRX/OS Assembler Reference Manual
QuoteRef: menaLF10_1842 ;;Menabrea, L.F., Sketch of the analytical engine invented by Charles Babbage, With notes upon the memoir by the translator Ada Augusta, Countess of Lovelace [OK]
QuoteRef: mendE3_1988 ;;Mendelson, E., $200 Guide: Hypertext for the PC
QuoteRef: mengB3_1981 ;;Mengarini, B., Macro facilities in Ada
QuoteRef: menoVS1_2006 ;;Menon, V.S. et al., A verifiable SSA program representation for aggressive compiler optimization
QuoteRef: menzT1_2007 ;;Menzies, T. et al., The strangest thing about software
QuoteRef: mercRT6_2021 ;;Mercuri, R.T., Neumann, P.G., The risks of election believability (or lack thereof) [NewQuotes]
QuoteRef: merePO6_2010 ;;Meredith, P.O. et al., Efficient monitoring of parametric context-free patterns
QuoteRef: merrG12_1983 ;;Merrill, G., Proofs, program correctness, and software engineering
QuoteRef: merwJ4_2007 ;;van der Merwe, J. et al., A survey on peer-to-peer key management for mobile ad hoc networks
QuoteRef: mesbA6_2012 ;;Mesbah, A., Mirshokraie, S., Automated analysis of CSS rules to support style maintenance
QuoteRef: mesnMP4_2009 ;;Mesnier, M.P. et al., Relative fitness modeling
QuoteRef: messHP_1995 ;;Messmer, H.-P., The indispensable PC hardware book
QuoteRef: messJ2_1982 ;;Messerschmidt, J., Wilhelm, R., Constructors for composed objects
QuoteRef: meurJ1_1977 ;;van Meurs, J., Cardozo, E.L., Interfacing the user
QuoteRef: meyeB1_1985 ;;Meyer, B., On formalism in specifications
QuoteRef: meyeB9_1990 ;;Meyer, B., Tools for the new culture: Lessons from the design of the Eiffel libraries
QuoteRef: meyeB10_1992 ;;Meyer, B., Applying "Design by contract"
QuoteRef: meyeB8_2008 ;;Meyer, B., Seven principles of software testing
QuoteRef: meyeB9_2009 ;;Meyer, B. et al., Programs that test themselves
QuoteRef: meyeB_2010 ;;Meyer, B. et al., Avoid a void: The eradication of null dereferencing [NewQuotes]
QuoteRef: meyeJ10_2014 ;;Meyerson, J., The Go programming language [podcast with A. Gerrand]
QuoteRef: meyeLA10_2009 ;;Meyerovich, L.A. et al., Flapjax: a programming language for Ajax applications
QuoteRef: mezzG11_2016 ;;Mezzetti, G. et al., Type unsoundness in practice: an empirical study of Dart
QuoteRef: micaS2_2002 ;;Micali, S., Rivets, R.L., Micropayment revisited
QuoteRef: michJR9_2000 ;;Michener, J.R., Acar, T., Security domains: key management in large-scale systems
QuoteRef: michMM6_2004 ;;Michael, M.M., Scalable lock-free dynamic memory allocation
QuoteRef: midtJ6_2012 ;;Midtgaard, J., Control-flow analysis of functional programs
QuoteRef: midtJ9_2013 ;;Midtgaard, J. et al., Engineering definitional interpreters
QuoteRef: milgE_1972 ;;Milgram, E., Katzenelson, J., Data structures in the extensible programming language AEPL
QuoteRef: millDC_1986 ;;Miller, D.C., Finally it works: Now it must "Play in Peoria"
QuoteRef: millGA7_1990 ;;Miller, G.A. et al., Nouns in WordNet: A lexical inheritance system
QuoteRef: millH_1973 ;;Mills, H., The complexity of programs
QuoteRef: millHD_1971 ;;Mills, H.D., Top-down programming in large systems
QuoteRef: millHD6_1975 ;;Mills, H.D., How to write correct programs and know it
QuoteRef: millHD_1979 ;;Mills, H.D., Software development
QuoteRef: millHD9_1982 ;;Mills, H.D., The intellectual control of computers
QuoteRef: millHD2_1986 ;;Mills, H.D., Linger, R.C., Data structured programming: Program design without arrays and pointers
QuoteRef: millHD9_1987 ;;Mills, H.D. et al., Cleanroom software engineering
QuoteRef: millJS_1843 ;;Mill, J.S., A System of Logic
QuoteRef: millJS_1843x ;;Mill, J.S., A System of Logic Ratiocinative and Inductive. Being a Connected View of the Principles of Evidence and the Methods of Scientific Investigation [NewQuotes]
QuoteRef: millKW3_2001 ;;Miller, K.W., A modest proposal for software testing
QuoteRef: millLA10_1978 ;;Miller, L.A., Behavioral studies of the programming process
QuoteRef: millLH6_1977 ;;Miller, L.H., A study in man-machine interaction
QuoteRef: millLJ_1981 ;;Miller, L.J., The ISO reference model of open systems interconnection: a First tutorial
QuoteRef: millMJ1_1993 ;;Miller, M.J., The best software is a drag
QuoteRef: millRB_1968 ;;Miller, R.B., Response time in man-computer conversational transactions
QuoteRef: millT10_2004 ;;Millstein, T., Practical predicate dispatch
QuoteRef: millW7_1988 ;;Miller, W., Myers, E.W., A simple row-replacement method
QuoteRef: milnR1_1993 ;;Milner, R., Elements of interaction
QuoteRef: milnR_1997 ;;Milner, R. et al., The Definition of Standard ML (Revised)
QuoteRef: miloDS9_2000 ;;Milojicic, D.S. et al., Process Migration
QuoteRef: miltS8_2008 ;;Matched, S. et al., Decentralized access control in distributed file systems
QuoteRef: minJK8_2006 ;;Min, J.-K. et al., A compressor for effective archiving, retrieval, and updating of XML documents
QuoteRef: minkH9_1908 ;;Minkowski, H., Space and time
QuoteRef: minoT5_1982 ;;Minoura, T., Wiederhold, G., Resilient extended true-copy token scheme for a distributed database system
QuoteRef: minsM_1981 ;;Minsky, M., A framework for representing knowledge
QuoteRef: minsNH7_1996 ;;Minsky, N.H., Towards alias-free pointers
QuoteRef: minsY11_2012 ;;Minsky, Y., OCaml for the masses
QuoteRef: mira10_2004 ;;MIRA Limited, MISRA-C:2004. Guidelines for the use of the C language in critical systems [NewQuotes]
QuoteRef: miraE11_1999 ;;Miranda, E., Context management in VisualWorks 5i [NewQuotes]
QuoteRef: miraE6_2015 ;;Miranda, E., Bera, C., A partial read barrier for efficient support of live object-oriented programming
QuoteRef: misrVN_1966 ;;Misra, V. N., The Descriptive Technique of Panini
QuoteRef: mitcJ3_1976 ;;Mitchell, J., Wegbreit, B., A next step in data structuring for programming languages
QuoteRef: mitcJ4_1989 ;;Mitchell, J., Shneiderman, B., Dynamic versus static menus: An exploratory comparison
QuoteRef: mitcJC1_2001 ;;Mitchell, J.C., Programming language methods in computer security
QuoteRef: mitcJG6_1970 ;;Mitchell, J.G., The design and construction of flexible and efficient interactive programming systems
QuoteRef: mitcJG_1977 ;;Mitchell, J.G., Wegreit, B., Schemes: a high level data structuring concept
QuoteRef: mitcN10_2007 ;;Mitchell, N., Sevitsky, G., The causes of bloat, the limits of health
QuoteRef: mitcN1_2010 ;;Mitchell, N. et al., Four trends leading to Java runtime bloat
QuoteRef: mitcN9_2012 ;;Mitchell, N., Shake before building. Replacing Make with Haskell
QuoteRef: mitcN11_2013 ;;Mitchell, N., Leaking space
QuoteRef: mitcR_1979 ;;Mitchell, R., Less Than Words Can Say
QuoteRef: mitrNJ1_2013 ;;Mitra, N.J. et al., Illustrating how mechanical assemblies work
QuoteRef: mitzM4_2002 ;;Mitzenmacher, M., Unbiasing random bits
QuoteRef: mitzM5_2002 ;;Mitzenmacher, M., Good hash tables & multiple hash functions
QuoteRef: mockA7_2002 ;;Mockus, A. et al., Two case studies of open source software development: Apache and Mozilla
QuoteRef: mockA5_2003 ;;Mockus, A. et al., Understanding and predicting effort in software projects
QuoteRef: moevC_2005 ;;Moevs, C., The Metaphysics of Dante's Comedy
QuoteRef: moffA3_1994 ;;Moffat, A. et al., Static compression for dynamic texts
QuoteRef: moffA3_1995 ;;Moffat, A. et al., Arithmetic coding revisited (extended abstract)
QuoteRef: moffA8_1995 ;;Moffat, A., Bell, T.A.H., In situ generation of compressed inverted files
QuoteRef: moffA7_1996 ;;Moffat, A. et al., Splaysort: fast, versatile, practical
QuoteRef: moffA10_1996 ;;Moffat, A., Zobel, J., Self-indexing inverted files for fast text retrieval
QuoteRef: moffA7_1999 ;;Moffat, A., An improved data structure for cumulative probability tables
QuoteRef: moffA12_2008 ;;Moffat, A., Zobel, J., Rank-based precision for measurement of retrieval effectiveness
QuoteRef: moffA8_2019 ;;Moffat, A., Huffman coding [NewQuotes]
QuoteRef: moffA7_2020 ;;Moffat, A., Petri, M., Large-alphabet semi-static entropy coding via asymmetric numeral systems [NewQuotes]
QuoteRef: moffDV7_1981 ;;Moffat, D.V., A model for PASCAL-like typing
QuoteRef: moguJC8_1997 ;;Mogul, J.C., Ramakrishnan, K.K., Eliminating receive livelock in an interrupt-driven kernel
QuoteRef: mohaC3_1992 ;;Mohan, C. et al., ARIES: A transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging [NewQuotes]
QuoteRef: mohaMF3_1991 ;;Mohageg, M.F., Object-oriented versus bit-mapped graphics interfaces: performance and preference differences for typical applications
QuoteRef: mokhA9_2016 ;;Mokhov, A. et al., Non-recursive make considered harmful. Build systems at scale
QuoteRef: mokhA9_2018 ;;Mokhov, A. et al., Build systems a la carte [NewQuotes]
QuoteRef: moliR3_1990 ;;Molich, R., Nielsen, J., Improving a human-computer dialogue
QuoteRef: molnG8_1971 ;;Molnar, G., SEL a self-extensible programming language
QuoteRef: monaF8_2022 ;;Monaco, F., Color blind accessibility manifesto [NewQuotes]
QuoteRef: monnD5_2008 ;;Monniaux, D., The pitfalls of verifying floating-point computations
QuoteRef: monoJ_1971 ;;Monod, J., Chance and necessity
QuoteRef: monsC1_2012 ;;Monsanto, C. et al., A compiler and run-time system for network programming languages
QuoteRef: montP6_2008 ;;Montesinos, P. et al., DoLorean: Recording and deterministically replaying shared-memory multiprocessor execution efficiently
QuoteRef: montP3_2009 ;;Montesinos, P. et al., Capo: a software-hardware interface for practical deterministic multiprocessor replay
QuoteRef: mooeCN8_1946 ;;Mooers, C.N., Code and control IV. Examples of a three-address code and the use of "Stop order tags"
QuoteRef: mooeCN9_1947 ;;Mooers, C.N., Putting Probability to work in coding punched cards -- Zatocoding [NewQuotes]
QuoteRef: mooeCN_1948 ;;Mooers, C.N., Application of random codes to the gathering of statistical information [NewQuotes]
QuoteRef: mooeCN8_1965 ;;Mooers, C.N., TRAC, a text handling language
QuoteRef: moorAW_2019 ;;Moore, A.W., The Infinite [NewQuotes]
QuoteRef: moorCH6_1970 ;;Moore, C.H., Programming a problem-oriented language
QuoteRef: moorCH6_1974 ;;Moore, C.H., FORTH: a new way to program a mini-computer
QuoteRef: moorEF_1964 ;;Moore, E.F., The firing squad synchronization problem
QuoteRef: moraTP10_1978 ;;Moran, T.P., Introduction to the command language grammar
QuoteRef: moraTP3_1981 ;;Moran, T.P., An applied psychology of the user
QuoteRef: morcAI4_1990 ;;Morch, A.I., Using critics to empower users
QuoteRef: moreDV7_1983 ;;Moreland, D.V., Human factors guidelines for terminal interface design
QuoteRef: morgC8_1981 ;;Morgan, C., Smalltalk: A language for the 1980s
QuoteRef: morgC4_1982 ;;Morgan, C., A revolution in your pocket
QuoteRef: morgH_1980 ;;Morgan, H. et al., Database management systems
QuoteRef: morlSG_1947 ;;Morley, S.G., The ancient Maya [NewQuotes]
QuoteRef: morrA11_16 ;;Morrison, A., Scaling synchronization in multicore programs
QuoteRef: morrA2_2013 ;;Morrison, A., Afek, Y., Fast concurrent queues for x86 processors
QuoteRef: morrG1_1998 ;;Morrisett, G. et al., From system F to typed assembly language
QuoteRef: morrJC10_1977 ;;Morrison, J.C., Philosophy and history in Bacon [NewQuotes]
QuoteRef: morrJH8_1972 ;;Morris, J.H., Jr., Wells, M.B., The specification of program flow in Madcap 6
QuoteRef: morrJH1_1973 ;;Morris, J.H. Jr., Protection in programming languages
QuoteRef: morrJH10_1973 ;;Morris, J.H. Jr., Types are not sets
QuoteRef: morrJH_1974 ;;Morris, J.H. Jr., Towards more flexible type systems
QuoteRef: morrJH_1980 ;;Morris, J.H. et al., Experience with an applicative string processing language
QuoteRef: morrR4_1978 ;;Morris, R., Thompson, K., Password security: A case history
QuoteRef: morrR11_1979 ;;Morris, R., Thompson, K., Password security: A case history
QuoteRef: morsD1_1986 ;;Morshedian, D., How to fight password pirates and win, letter to The Open Channel
QuoteRef: mosbD1_1996 ;;Mosberger, D. et al., Implementing atomic sequences on uniprocessors using rollforward
QuoteRef: moseJ6_1970 ;;Moses, J., The function of FUNCTION in LISP or Why the FUNARG problem should be called the environment problem [NewQuotes]
QuoteRef: mossA12_2018 ;;Moss, A. et al., C.forAll.: Adding modern programming language features to C [NewQuotes]
QuoteRef: mossCD1_1980 ;;Moss, C.D.S., Structured programming with LOOP statements
QuoteRef: mossK10_2000 ;;Moss, K., How can I measure Java code performance?
QuoteRef: mostJ11_1985 ;;Mostow, J., Foreword What is AI? And what does it have to do with software engineering
QuoteRef: mottL10_2018 ;;Mottola, L., Whitehouse, K., Fundamental concepts of reactive control for autonomous drones [NewQuotes]
QuoteRef: moulB2_2008 ;;Moulton, B., Feedback: Cracking CAPTCHA is a Good Thing
QuoteRef: mounM9_2019 ;;Mountantonakis, M., Tzitzikas, Y., Large-scale semantic integration of linked data: a survey [NewQuotes]
QuoteRef: mourES8_1998 ;;de Moura, E.S. et al., Fast searching on compressed text allowing errors
QuoteRef: muccP6_2005 ;;Mucci, P. et al., Performance monitoring with PAPI
QuoteRef: muchSS_1976 ;;Muchnick, S.S., The command interpreter and command language design of the COM-SHARE Commander II system
QuoteRef: muelC_1982 ;;Mueller-schloer, C., Wagner N.R., The implementation of a cryptography-based secure office system
QuoteRef: mulaW7_2018 ;;Mula, W., Lemire, D., Faster base64 encoding and decoding using AVX2 instructions [NewQuotes]
QuoteRef: mullAP_1964 ;;Mullery, A.P., A procedure-oriented machine language
QuoteRef: mullJK8_1983 ;;Mullin, J.K., A second look at bloom filters
QuoteRef: mumps ;;Massachusets General Hospital, MUMPS
QuoteRef: munrJI5_2001 ;;Munro, J.I. et al., Space efficient suffix trees
QuoteRef: munsJP10_1994 ;;Munson, J.P., Dewan, P., A flexible object merging framework [NewQuotes]
QuoteRef: muraFU4_2017 ;;Muram, F.U. et al., Systematic review of software behavioral model consistency checking [NewQuotes]
QuoteRef: murpB11_2004 ;;Murphy, B., Automating software failure reporting
QuoteRef: murpE5_2009 ;;Murphy-Hill, E. et al., How we refactor, and how we know it
QuoteRef: murrA_1978 ;;Murray, A., Reason and Society in the Middle Ages [ExtraQuote]
QuoteRef: murrDG6_2011 ;;Murray, D.G. et al., Steno: automatic optimization of declarative queries
QuoteRef: murrDG10_2016 ;;Murray, D.G. et al., Incremental, iterative data processing with timely dataflow
QuoteRef: murrKM_1977 ;;Murray, K.M.E., Caught in the Web of Words. James A. H. Murray and the Oxford English Dictionary
QuoteRef: murtTP7_1991 ;;Murtagh, T.P., An improved storage management scheme for block structured languages
QuoteRef: musaJD3_1993 ;;Musa, J.D., Operational profiles in software-reliability engineering
QuoteRef: muscR10_2008 ;;Muschevici, R. et al., Multiple dispatch in practice
QuoteRef: muslK5_2014 ;;Muslu, K. et al., Transition for centralized to decentralized version control systems: a case study on reasons, barriers, and outcomes
QuoteRef: mussDR7_1988 ;;Musser, D.R., Stepanov, A.A., Generic programming
QuoteRef: musuM12_2008 ;;Musuvathi, M. et al., Finding and reproducing Heisenbugs in concurrent programs
QuoteRef: musuM6_2014 ;;Musuvathi, M., Safety-first approach to memory consistency models
QuoteRef: muteP7_1991 ;;Muter, P., Maurutto, P., Reading and skimming from computer screens and books: the paperless office revisited?
QuoteRef: myerB3_2000 ;;Myers, B. et al., Past, present, and future of user interface software tools
QuoteRef: myerBA7_1990 ;;Myers, B.A., A new model for handling input
QuoteRef: myerBA11_1991 ;;Myers, B.A., Separating application code from toolkits: Eliminating the spaghetti of call-backs.
QuoteRef: myerBA_1992 ;;Myers, B.A. et al., Report of the "End-user programming" working group
QuoteRef: myerBA8_1992 ;;Myers, B.A., Demonstrational interfaces: A step beyond direct manipulation
QuoteRef: myerBA11_1998 ;;Myers, B.A. et al., Collaboration using multiple PDAs connected to a PC
QuoteRef: myerGJ3_1976 ;;Myers, G.J., Composite design facilities of six programming languages
QuoteRef: myerW2_1978 ;;Myers, W., The need for software engineering
QuoteRef: mytkT6_2010 ;;Mytkowicz, T. et al., Evaluating the accuracy of Java profilers
QuoteRef: mytkT10_2010 ;;Mytkowicz, T. et al., Inferred call path profiling
QuoteRef: mytkT3_2014 ;;Mytkowicz, T. et al., Data-parallel finite-state machines
QuoteRef: nachO_2018 ;;Nachtomy, O., Winegar, R., Introduction: infinity in early modern philosophy [NewQuotes]
QuoteRef: nachR6_2002 ;;Nachmias, R., Gilad, A., Needle in a hyperstack: searching for information on the World Wide Web
QuoteRef: nagaN_2011 ;;Nagappan, N., Ball, T., Evidence-based failure prediction
QuoteRef: nagaS6_2009 ;;Nagarakatte, S. et al., SoftBound: highly compatible and complete spatial memory safety for C
QuoteRef: nagaS6_2010 ;;Nagakatte, S. et al., CETS: compiler-enforced temporal safety for C
QuoteRef: naikM6_2006 ;;Naik, M. et al., Effective static race detection for Java
QuoteRef: naikM1_2007 ;;Naik, M., Aiken, A., Conditional must not aliasing for static race detection
QuoteRef: nakaH10_2001 ;;Nakamura, H., Incremental computation of complex object queries
QuoteRef: nakaT6_2010 ;;Nakaike, T., Michael, M.M., Lock elision for read-only critical sections in Java
QuoteRef: nanaJ12_1988 ;;Nanard, J. et al., Conceptual documents: A mechanism for specifying active views in hypertext
QuoteRef: nappRB2_1976 ;;Napper, R.B.E., Fisher, R.N., ALEC--A user extensible scientific programming language
QuoteRef: naraA12_2017 ;;Narayanan, A., Clark, J., Bitcoin's academic pedigree [NewQuotes]
QuoteRef: naraG3_2016 ;;Narayanaswamy, G. et al., The virtues of conflict: analysing modern concurrency
QuoteRef: naraS6_2007 ;;Narayanasamy, S. et al., Automatically classifying benign and harmful data races using replay analysis
QuoteRef: nashD1_2018 ;;Nashat, D., Amer, A.A., A comprehensive taxonomy of fragmentation and allocation techniques in distributed database design [NewQuotes]
QuoteRef: nasrR6_2012 ;;Nasre, R., Exploiting the structure of the constraint graph for efficient points-to analysis
QuoteRef: nassI8_1973 ;;Nassie, I., Schneiderman, B., Flowchart techniques for structured programming
QuoteRef: naurP1_1963 ;;Naur P. et al., Revised report on the algorithmic language Algol 60
QuoteRef: naurP3_1969 ;;Naur, P., Programming by action clusters
QuoteRef: naurP4_1993 ;;Naur, P., Understanding Turing's universal machine--Personal style in program description
QuoteRef: navaG1_1999 ;;Navarro, G., Baeza-Yates, R., Very fast and simple approximate string matching
QuoteRef: navaG7_1999 ;;Navarro, G., Raffinot, M., Fast regular expression search
QuoteRef: navaG3_2001 ;;Navarro, G., A guided tour to approximate string matching
QuoteRef: navaG3_2001a ;;Navarro, G. et al., Faster approximate string matching over compressed text
QuoteRef: navaG7_2001 ;;Navarro, G., Regular expression searching over Ziv-Lempel compressed text
QuoteRef: navaG9_2002 ;;Navarro, G., Indexing text using the Ziv-Lempel Trie
QuoteRef: navaG10_2005 ;;Navarro, G., Tarhio, J., LZgrep: a Boyer-Moore string matching tool for Ziv-Lempel compressed text
QuoteRef: navaG4_2007 ;;Navarro, G., Makinen, V., Compressed full-text indexes
QuoteRef: navaG9_2020 ;;Navarro, G., Rojas-Ledesma, J., Predecessor search [NewQuotes]
QuoteRef: navaG2_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part II: Compressed indexes [NewQuotes]
QuoteRef: navaG3_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part I: Repetitiveness measures [NewQuotes]
QuoteRef: necuGC10_1996 ;;Necula, G.C., Lee, P., Safe kernel extensions without run-time checking
QuoteRef: necuGC5_2005 ;;Necula, G.C. et al., CCured: Type-safe retrofitting of legacy software
QuoteRef: needD10_1982 ;;Needle, D., Service Calvados toasts Apple users with Harris link
QuoteRef: needD12_2010 ;;Needell, D., Tropp, J.A., CoSaMP: Iterative signal recovery from incomplete and inaccurate samples
QuoteRef: needRM11_1977 ;;Needham, R.M., Birrell, A.D., The Cap filing system
QuoteRef: needRM12_1978 ;;Needham, R.M., Schroeder, M.D., Using encryption for authentication in large networks of computers
QuoteRef: neelN3_2010 ;;Neelakantam, N. et al., A real system evaluation of hardware atomicity for software speculation
QuoteRef: neelPM_1973 ;;Neely, P.M., On program control structure
QuoteRef: negaS2_2011 ;;Negara, S. et al., Inferring ownership transfer for efficient message passing
QuoteRef: nejmBA2_1988 ;;Nejmeh, B.A., The design of a PDL environment
QuoteRef: nelsG_1991 ;;Nelson, G., Systems Programming in Modula-3
QuoteRef: nelsMR8_1996 ;;Nelson, M.R., Fast string searching with suffix trees
QuoteRef: nelsMR9_1996 ;;Nelson, M.R., Data compression with the Burrows Wheeler transform
QuoteRef: nelsTH8_1965 ;;Nelson, T.H., A file structure for the complex, the changing and the indeterminate
QuoteRef: nelsTH_1967 ;;Nelson, T.H., Getting it out of our system
QuoteRef: nelsTH_1974 ;;Nelson, T.H., Dream Machines
QuoteRef: nelsTH12_1986 ;;Nelson, T.H., The tyranny of the file
QuoteRef: nelsTH_1987 ;;Nelson, T.H., Literary Machines
QuoteRef: nelsTH1_1988 ;;Nelson, T.H., Managing immense storage
QuoteRef: neugW_1982 ;;Neugent, W., Acceptance criteria for computer security
QuoteRef: neuhEJ2_1971 ;;Neuhold, E.J., The formal description of programming languages
QuoteRef: neumJ6_1945 ;;von Neumann, J., First draft of a report on the EDVAC
QuoteRef: neumJ_1951 ;;von Neumann, J., The general and logical theory of automata
QuoteRef: neumJ_1958 ;;von Neumann, J., The Computer and the Brain
QuoteRef: neumPG4_1994 ;;Neumann, P.G., Risks of passwords
QuoteRef: neusRE_1986 ;;Neustadt, R.E., May, E.R., Thinking in Time
QuoteRef: neuwC11_1987 ;;Neuwirth, C. et al., The Notes program: A hypertext application for writing from source texts
QuoteRef: neviCG3_1999 ;;Nevill-Manning, C.G., Witten, I.H., Protein is incompressible
QuoteRef: neviGV9_2007 ;;Neville-Neil, G.V., The next big thing (Kode Vicious)
QuoteRef: newcC6_2014 ;;Newcombe, C., Why Amazon chose TLA+
QuoteRef: newcC4_2015 ;;Newcombe, C. et al., How Amazon web services uses formal methods
QuoteRef: neweA10_1977 ;;Newell, A. et al., L*: an interactive symbolic implementation system [NewQuotes]
QuoteRef: newfD11_1998 ;;Newfield, d. et al., Scratchpad: Mechanisms for better navigation in directed web searching
QuoteRef: newpEL_1982 ;;Newport, E.L., Task specificity in language learning? Evidence from speech perception and American Sign Language
QuoteRef: newtI_1685 ;;Newton, I, Mathematical principles of natural philosophy [OK]
QuoteRef: newtI_1707 ;;Newton, I., Arithmetica Universalis : sive de compositione et resolutione arithmetica liber [NewQuotes]
QuoteRef: ngWT4_2001 ;;Ng, W.T., Chen, P.M., The design and verification of the Rio file cache
QuoteRef: nguyD3_2011 ;;Nguyen, D., Pingali, K., Synthesizing concurrent schedulers for irregular algorithms
QuoteRef: nguyK3_2018 ;;Nguyen, K. et al., Skyway: connecting managed heaps in distributed big data systems [NewQuotes]
QuoteRef: nguyTV5_2005 ;;Nguyen, T.V.N., Irigoin, F., Efficient and effective array bound checking
QuoteRef: nicoA2_2009 ;;Nicolau, A. et al., Techniques for efficient placement of synchronization primitives
QuoteRef: nicoG_100 ;;Nicomachus of Gerasa, Introduction to Arithmetic
QuoteRef: nicoJR6_1993 ;;Nicol, J.R. et al., Object orientation in heterogeneous distributed computing systems
QuoteRef: nielJ5_1989 ;;Nielsen, J., Richards, J.T., The experience of learning and using Smalltalk
QuoteRef: nielJ3_1990 ;;Nielsen, J., The art of navigating through hypertext
QuoteRef: nielJ5_1990 ;;Nielsen, J., Big paybacks from 'discount' usability engineering
QuoteRef: nielJ11_1993 ;;Nielsen, J., Is usability engineering really worth it?
QuoteRef: nielJP3_2016 ;;Nielsen, J.P., Karlsson, S., A scalable lock-free hash table with open addressing
QuoteRef: nienK11_2016 ;;Nienhuis, K. et al., An operational semantics for C/C++11 concurrency [NewQuotes]
QuoteRef: nievJ8_1970 ;;Nievergelt, J., Irland, M.I., Bounce-and-skip: a technique for directing the flow of control in programs
QuoteRef: nikhRS10_2011 ;;Nikhil, R., Abstraction in hardware system design
QuoteRef: nipkT1_1998 ;;Nipkow, T., von Oheimb, D., Javalight is type-safe -- definitely
QuoteRef: nishH_1980 ;;Nishimura, H., Descriptively complete process logic
QuoteRef: nishM12_2001 ;;Nishioka, M. et al., Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring
QuoteRef: nislE5_2005 ;;Nisley, E., Reliability: the hard and the soft
QuoteRef: nislE1_2007 ;;Nisley, E., Root the vote: the hard and the soft
QuoteRef: nistA5_2013 ;;Nistor, A. et al., Toddler: detecting performance problems via similar memory-access patterns
QuoteRef: noonM6_2016 ;;Noonan, M. et al., Polymorphic type inference for machine code
QuoteRef: nordB3_1976 ;;Nordstrom, B., An outline of a mathematical model for the definition and manipulation of data
QuoteRef: normDA_1986 ;;Norman, D.A., Cognitive engineering
QuoteRef: normDA_1988 ;;Norman, D.A., The Design of Everyday Things
QuoteRef: normDA4_1993 ;;Norman, D.A., Using names as identifiers
QuoteRef: noshK_1972 ;;Noshita, K. et al., Formal-2: A simple data-free form-expressional programming language with nondeterminism
QuoteRef: nourIR9_2021 ;;Nourbakhsh, I.R., AI ethics: A call to faculty [NewQuotes]
QuoteRef: novaG6_2007 ;;Novark, G. et al., Exterminator: automatically correcting memory errors with high probability
QuoteRef: novaG6_2009 ;;Novark, G. et al., Efficiently and precisely locating memory leaks and bloat
QuoteRef: novaGS8_1995 ;;Novak, G.S. Jr., Conversion of units of measurement
QuoteRef: nowiDA8_1978 ;;Nowitz, D.A., Lesk, M.E., A Dial-up network of UNIX systems
QuoteRef: ntziG10_2015 ;;Ntzik, G., Gardner, P., Reasoning about the POSIX file system
QuoteRef: nuneD11_2016 ;;Nunez, D. et al., Prioritized garbage collection: explicit GC support for software caches [NewQuotes]
QuoteRef: nygaK_1981 ;;Nygaard, K., Handlykken, P., The System development process -- Its setting, some problems and needs for methods.
QuoteRef: nygaK10_1983 ;;Nygaard, K., talk at ACM Annual Conference
QuoteRef: nygaK10_1986 ;;Nygaard, K., Basic concepts in object oriented programming
QuoteRef: nystN10_2011 ;;Nystrom, N. et al., Firepile: run-time compilation for GPUs in Scala
QuoteRef: ocalR8_2020 ;;O'Callahan, R. et al., To catch a failure: The record-and-replay approach to debugging [NewQuotes]
QuoteRef: ockhW_1319 ;;Ockham, William of, Ordinatio [Second version of Book One of Commentary on the Sentences]
QuoteRef: ockhW_1323a ;;Ockham, William of, Expositio in duos libros Perihermenias
QuoteRef: ockhW_1323b ;;Ockham, William of, Tractatus de Praedestinatione et de praesscientia Dei et de futuris contingentibus
QuoteRef: ockhW_1323c ;;Ockham, William of, Prologus (B. pp. 2-16)
QuoteRef: ockhW_1323d ;;Ockham, William of, Summa totius logicae
QuoteRef: ockhW_1323e ;;Ockham, William of, Quodlibeta Septem
QuoteRef: ockhW_1323f ;;Ockham, William of, Summa totius logicae [NewQuotes]
QuoteRef: ockhW_1324 ;;Ockham, W., Quodlibeta Septem [NewQuotes]
QuoteRef: oderM10_2005 ;;Odersky, M., Zenger, M., Scalable component abstractions [NewQuotes]
QuoteRef: oderM4_2014 ;;Odersky, M., Rompf, T., Unifying functional and object-oriented programming with Scala
QuoteRef: oettAG_1972 ;;Oettinger, A.G., The Semantic Wall
QuoteRef: ogasT10_1995 ;;Ogassawara, T., An algorithm with constant execution time for dynamic storage allocation [NewQuotes]
QuoteRef: ogasT7_2004 ;;Ogasawara, T. et al., Optimizing precision overhead for x86 processors
QuoteRef: ogatK10_2010 ;;Ogata, K. et al., A study of Java's non-Java memory
QuoteRef: ohalJJ_1980 ;;Ohala, J.J., The application of phonological universals in speech pathology
QuoteRef: oharK3_1997 ;;O'Hara, K., Sellen, a., A comparison of reading paper and on-line documents
QuoteRef: oheaP2_2019 ;;O'Hearn, P., Separation logic [NewQuotes]
QuoteRef: oiwaY6_2009 ;;Oiwa, Y., Implementation of the memory-safe full ANSI-C compiler
QuoteRef: oldeRR5_1985 ;;Oldehoeft, R.R., Allan, S.J., Adaptive exact-fit storage management
QuoteRef: olinR1_2006 ;;Olinsky, R. et al., Staged allocation: a compositional technique for specifying and implementing procedure calling conventions
QuoteRef: olivO6_2015 ;;Olivo, O. et al., Static detection of asymptotic performance bugs in collection traversals
QuoteRef: olloA_1974 ;;Ollongren, A., Definition of Program Languages by Interpreting Automata
QuoteRef: olseKA7_2011 ;;Olsen, K.A., Programmed politeness
QuoteRef: olseKA8_2012 ;;Olsen, K.A., Nordhaug, H.F., Internet elections: Unsafe in any home?
QuoteRef: olseNC9_1993 ;;Olsen, N.C., The software rush hour
QuoteRef: olstC9_2003 ;;Olston, C., Chi, E.H., ScentTrails: integrating browsing and searching on the web
QuoteRef: omanPW5_1990 ;;Oman, P.W., Cook, C.R., Typographic style is more than cosmetic
QuoteRef: omarC10_2016 ;;Omar, C., Aldrich, J., Programmable semantic fragments. The design and implementation of typy
QuoteRef: ongaD6_2014 ;;Ongaro, D., Ousterhout, J., In search of an understandable consensus algorithm [NewQuotes]
QuoteRef: oppeDC10_1981 ;;Oppen, D.C., Dalal, Y.K., The clearinghouse: A decentralized agent for locating named objects in a distributed environment
QuoteRef: oppeDC7_1983 ;;Oppen, D.C., Dalal, Y.K., The clearinghouse: A decentralized agent for locating named objects in a distributed environment
QuoteRef: opplR3_2008 ;;Oppliger, R. et al., SSL/TLS session-aware user authentication
QuoteRef: oreJP2_2021 ;;Ore, J.-P. et al., An empirical study on type annotations: Accuracy, speed, and suggestion effectiveness [NewQuotes]
QuoteRef: oresN_1355 ;;Oresme, N., Tractatus de configurationibus qualitatum et motuum [NewQuotes]
QuoteRef: oresN_1370 ;;Oresme, N., De Causis Mirabilium [NewQuotes]
QuoteRef: orjiCU9_1994 ;;Orji, C.U., Solworth, J.A., Write twice disk buffering
QuoteRef: orouL10_2020 ;;O'Rourke, L., et al, The Philae lander reveals low-strength primitive ice inside cometary boulders [NewQuotes]
QuoteRef: orrKT_1977 ;;Orr, K.T., Structured Systems Development
QuoteRef: orrMA_1913 ;;Orr, M.A., Dante and the early astronomers
QuoteRef: osteE6_2016 ;;Osterlund, E., Lowe, W., Block-free concurrent GC: Stack scanning and copying
QuoteRef: osteE7_2021 ;;Osterweil, E., A cybersecurity terminarch: Use it before we lose it [NewQuotes]
QuoteRef: osteLJ11_1983 ;;Osterweil, L.J., Toolpack--an experimental software development environment research project
QuoteRef: ostrTJ7_2002 ;;Ostrand, T.J., Weyuker, E.J., The distribution of faults in a large industrial software system
QuoteRef: osulB9_2009 ;;O'Sullivan, B., Making sense of revision-control systems
QuoteRef: ottJ2_2021 ;;Ott, J. et al., BioScript: programming safe chemistry on laboratories-on-a-chip [NewQuotes]
QuoteRef: ottoD11_2006 ;;Ottoni, D. et al., Offset assignment using simultaneous variable coalescing
QuoteRef: oustJ7_2018 ;;Ousterhout, J., Always measure one level deeper [NewQuotes]
QuoteRef: oustJK2_1980 ;;Ousterhout, J.K. et al., Medusa: an experiment in distributed operating system structure
QuoteRef: oustJK6_1990 ;;Ousterhout, J.K., Why aren't operating systems getting faster as fast as hardware
QuoteRef: oustJK3_1998 ;;Ousterhout, J.K., Scripting: higher-level programming for the 21st century
QuoteRef: owenD_1986 ;;Owen, D., Answers first, then questions
QuoteRef: ozI3_2019 ;;Oz, I., Arslan, S., A survey of multithreading alternatives for soft error fault tolerance [NewQuotes]
QuoteRef: ozawK3_1991 ;;Ozawa, K., A fast O(n^2) division algorithm for multiple-precision floating-point numbers

Related up

ThesaHelp: references a-b
ThesaHelp: references c-d
ThesaHelp: references e-f
ThesaHelp: references g-h
ThesaHelp: references i-l
ThesaHelp: references m-o
ThesaHelp: references p-r
ThesaHelp: references sa-sz
ThesaHelp: references t-z

Updated barberCB 4/23
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber