Map
Index
Random
Help
Group
Notes
Related
th

ThesaHelp: references t-z

topic root > Group: all references


--related--
all references
references a-b
references c-d
references e-f
references g-h
references i-l
references m-o
references p-r
references sa-sz

--referenced--
all Thesa topics

Summary

Quotation references starting with 't', 'u', 'v', 'w', 'x', 'y', or 'z'. Includes 'A' to 'Z'

Group members up

QuoteRef: tackBD5_1999 ;;Tackett, B.D., van Doren, B., Process control for error-free software: a software success story
QuoteRef: taikC2_1982 ;;Tai, K-C, Comments on parameter passing techniques in programming languages
QuoteRef: taivA4_1993 ;;Taivalsaari, A., On the notion of object
QuoteRef: taivA11_1993 ;;Taivalsaari, A., A critical view of inheritance and reusability in object-oriented programming
QuoteRef: taivA9_1996 ;;Taivalsaari, A., On the notion of inheritance
QuoteRef: taivA11_1997 ;;Taivalsaari, A., Objects versus prototypes: Some philosophical and historical observations
QuoteRef: takaH1_1980 ;;Takahashi, H., An automatic-controller description language
QuoteRef: takaH10_2004 ;;Takagi, H. et al., Accessibility designer: visualizing usability for the blind
QuoteRef: takaT8_1980 ;;Takaoka, T., Introduction of history to variables
QuoteRef: tallNR1_2010 ;;Tallent, N.R. et al., Analyzing lock contention in multithreaded applications
QuoteRef: tallS1_2003 ;;Tallarn, S., Gupta, R., Bitwidth aware global register allocation
QuoteRef: taneAS12_1990 ;;Tanenbaum, A.S. et al., Experiences with the Amoeba distributed operating system
QuoteRef: taneAS8_1992 ;;Tanenbaum, A.S. et al., Parallel programming using shared objects and broadcasting
QuoteRef: taneAS5_2006 ;;Tanenbaum, A.S. et al., Can we make operating systems reliable and secure?
QuoteRef: taneAS_2007 ;;Tanenbaum, A.S., Van Steen, M., Distributed Systems. Principles and Paradigms
QuoteRef: tangH1_2015 ;;Tang, H. et al., Summary-based context-sensitive data-dependence analysis in presence of callbacks
QuoteRef: tangY7_2013 ;;Tang, Y. et al., Information distance between what I said and what it heard
QuoteRef: tapiMA11_1995 ;;Tapia, M.A., Kurtenbach, G., Some design refinements and principles on the appearance and behavior of marking menus
QuoteRef: tardD6_1992 ;;Tarditi, D. et al., No assembly required: compiling Standard ML to C
QuoteRef: tardD10_2000 ;;Tarditi, D., Compact garbage collection tables
QuoteRef: tardD10_2006 ;;Tarditi, D. et al., Accelerator: Using data parallelism to program GPUs for general-purpose uses
QuoteRef: tardO2_2014 ;;Tardieu, O. et al., X10 and APGAS at pentascale
QuoteRef: tarhJ12_2017 ;;Tarhio, J. et al., Technology beats algorithms (in exact string matching) [NewQuotes]
QuoteRef: tarjRE3_1987 ;;Tarjan, R.E., Algorithm design
QuoteRef: tarrP4_1998 ;;Tarr, P., Clarke, L.A., Consistency management for complex applications
QuoteRef: tarsA_1944 ;;Tarski, A., The semantic conception of truth and the foundations of semantics
QuoteRef: tarsA_1956 ;;Tarski, A., The concept of truth in formalized languages
QuoteRef: tateR1_2013 ;;Tate, R., The sequential semantics of producer effect systems
QuoteRef: tattI3_1998 ;;Tattersall, I., The origin of the human capacity
QuoteRef: taubM_1961 ;;Taube, M., Computers and Common Sense. The Myth of Thinking Machines
QuoteRef: tausL7_1997 ;;Tauscher, L., Greenberg, S., How people revisit web pages: empirical findings and implications for the design of history systems
QuoteRef: taylDJ11_1980 ;;Taylor, D.J. et al., Redundancy in data structures: improving software fault tolerance
QuoteRef: taylRW_1911 ;;Taylor, F.W., The Principles of Scientific Management [OK]
QuoteRef: teevJ4_2004 ;;Teevan, J. et al., The perfect search engine is not enough: a study of orienteering behavior in directed search
QuoteRef: teevJ7_2007 ;;Teevan, J. et al., Information re-retrieval: Repeat queries in Yahoo's logs
QuoteRef: teevJ9_2008 ;;Teevan, J., How people recall, recognize, and reuse search results
QuoteRef: teicD1_1977 ;;Teichroew, D, Hershey, E.A., PSL/PSA: a computer aided technique for structured documentation and analysis of information processing systems
QuoteRef: teitT6_1979 ;;Teitelbaum, T., The Cornell program synthesizer: a microcomputer implementation of PL/CS
QuoteRef: teitT6_1981 ;;Teitelbaum, T. et al., The Why and wherefore of the Cornell program synthesizer.
QuoteRef: teitT9_1981 ;;Teitelbaum, T., Reps, T., The Cornell program synthesizer: A syntax-directed programming environment
QuoteRef: teitW_1969 ;;Teitelman, W., Toward a programming laboratory
QuoteRef: teitW3_1977 ;;Teitelman, W., A display oriented programmer's assistant
QuoteRef: teitW3_1985 ;;Teitelman, W., A tour through Cedar
QuoteRef: telG1_1993 ;;Tel, G., Mattern, F., The derivation of distributed termination detection algorithms from garbage collection schemes
QuoteRef: teneA_1980 ;;Tenenbaum, A., Memory utilization efficiency under a class of first-fit algorithms.
QuoteRef: tennRD_1975 ;;Tennent, R.D., PASQUAL A proposed generalization of PASCAL
QuoteRef: tennRD8_1976 ;;Tennent, R.D., The denotational semantics of programming languages
QuoteRef: tennRD2_1977 ;;Tennent, R.D., Language design methods based on semantic principles
QuoteRef: tennT9_1988 ;;Tenny, T., Program readability: Procedures versus comments
QuoteRef: tereAA11_2000 ;;Terekov, A.A., Verhoof, C., The realities of language conversions
QuoteRef: tereD6_2014 ;;Terei, D. et al., M^3: High-performance memory management from off-the-shelf components
QuoteRef: terrD12_2013 ;;Terry, D., Replicated data consistency explained through baseball
QuoteRef: terrDB9_1994 ;;Terry, D.B. et al., Session guarantees for weakly consistent replicated data [NewQuotes]
QuoteRef: tesaG3_1995 ;;Tesauro, G., Temporal difference learning and TD-Gammon
QuoteRef: teslL8_1981 ;;Tesler, L., The Smalltalk environment
QuoteRef: teuhJ3_1991 ;;Teuhola, J., Wegner, L., Minimal space, average linear time duplicate deletion
QuoteRef: tevaA11_1989 ;;Tevanian, A. Jr., Smith, B., Mach: The model for future Unix
QuoteRef: tezuS4_1991 ;;Tezuka, S., L'Ecuyer, P., Efficient and portable combined Tausworthe random number generators
QuoteRef: thadAJ4_1981 ;;Thadhani, A.J., Interactive user productivity
QuoteRef: thamS11_2004 ;;Thammanur, S., Pande, S., A fast, memory-efficient register allocation framework for embedded systems
QuoteRef: thayTA3_1976 ;;Thayer, T.A. et al., Software reliability study
QuoteRef: theiH6_2001 ;;Theiling, H., Generating decision trees for decoding binaries
QuoteRef: thelT8_2003 ;;Thelin, T. et al., An experimental comparison of usage-based and checklist-based reading
QuoteRef: theoCI3_1991 ;;Theodoulidis, C.I., Loucopoulos, P., The time dimension in conceptual modeling
QuoteRef: theoMF11_2003 ;;Theofanos, M.F., Redish, J., Bridging the gap between accessibility and usability
QuoteRef: thilM12_2019 ;;Thilakaratne, M. et al., A systematic review of literature-based discovery: general overview, methodology, & statistical analysis [NewQuotes]
QuoteRef: thimH12_1978 ;;Thimbleby, H., A note on menu selection
QuoteRef: thimH2_1980 ;;Thimbleby, H., Leave and recall: Primitives for procedural programming
QuoteRef: thimH6_1989 ;;Thimbleby, H., [Literate Programming:] A review of Donald C. Lindsay's Text File difference utility, diff
QuoteRef: thomA3_1998 ;;Thomasian, A., Concurrency control: methods, performance, and analysis
QuoteRef: thomB12_2012 ;;Thomas, B. et al., SPDYing up the web
QuoteRef: thomCD11_1993 ;;Thomborson, C.D., Does your workstation computation belong on a vector supercomputer?
QuoteRef: thomD1_2001 ;;Thomas, D., Hunt, A., Programming in Ruby
QuoteRef: thomDB10_2007 ;;Thomas, D.B. et al., Gaussian random number generators
QuoteRef: thomF_1984 ;;Thomas, F., Johnston, R., Disney animation: the illusion of life
QuoteRef: thomG1_2000 ;;Thomas, G., eCos: An operating system for embedded systems
QuoteRef: thomK_1976 ;;Thompson, K., The UNIX command language
QuoteRef: thomK7_1978 ;;Thompson, K., UNIX time-sharing system: UNIX Implementation
QuoteRef: thomK8_1984 ;;Thompson, K., Reflections on trusting trust
QuoteRef: thomR_1975 ;;Thom, R., Structural Stability and Morphogenesis: An outline of a general theory of models.
QuoteRef: thomS4_2000 ;;Thompson, S., review 0004-0230 of Clarke, Grumberg, Peled, Model Checking, MIT Press 1999
QuoteRef: thorM1_2000 ;;Thorup, M., Even strongly universal hashing is pretty fast
QuoteRef: thorM7_2017 ;;Thorup, M., Fast and powerful hashing using tabulation [NewQuotes]
QuoteRef: thorRC_1969 ;;Thornton, R.C., A scientific, algorithmic, interactive language
QuoteRef: thorRM_2014 ;;Thorson, R.M., Walden's Shore. Henry David Thoreau and Nineteenth-Century Science [NewQuotes]
QuoteRef: thriMW_1983 ;;Thring, M.W., Robots and Telechirs: Manipulators with memory; remote manipulators; machine limbs for the handicapped
QuoteRef: ticeC4_2001 ;;Tice, C., Graham, S.L., A practical, robust method for generating variable range tables
QuoteRef: tichWF9_1979 ;;Tichy, W.F., Software development control based on module interconnection
QuoteRef: tichWF9_1982 ;;Tichy, W.F., Design, implementation, and evaluation of a revision control system
QuoteRef: tichWF11_1984 ;;Tichy, W.F., The string-to-string correction problem with block moves
QuoteRef: tichWF7_1985 ;;Tichy, W.F., RCS -- A system for version control
QuoteRef: tichWF11_1987 ;;Tichy, W.F., What can software engineers learn from artificial intelligence?
QuoteRef: tigeAS5_2012 ;;Tigelaar, A.S. et al., Peer-to-peer information retrieval: an overview
QuoteRef: tillN7_2006 ;;Tillmann, N., Shulte, W., Unit tests reloaded: parameterized unit testing with symbolic execution
QuoteRef: tobiS1_2008 ;;Tobin-Hochstadt, S., Felleisen, M., The design and implementation of Typed Scheme [NewQuotes]
QuoteRef: tobiS6_2011 ;;Tobin-Hochstadt, S. et al., Languages as libraries
QuoteRef: tockS11_1997 ;;Tockey, S., A missing link in software engineering
QuoteRef: tognB_1990 ;;Tognazzini, B., Consistency
QuoteRef: tognB_1992 ;;Tognazzini, B., Tog on Interface
QuoteRef: tognB4_1993 ;;Tognazzini, B., Common elements in today's graphical user interfaces: The good, the bad and the ugly
QuoteRef: torlE6_2010 ;;Torlak, E. et al., MemSAT: checking axiomatic specifications of memory models
QuoteRef: toroN7_2014 ;;Toronto, N., McCarthy, J., Practically accurate floating-point math [NewQuotes]
QuoteRef: torpK2_2000 ;;Torp, K. et al., Effective timestamping in databases
QuoteRef: torrJ12_2009 ;;Torrellas, J. et al., The bulk multicore architecture for improved programmability
QuoteRef: torrJC4_2000 ;;Torres, J.C., Conde, F.A., A fast algorithm to decide the inclusion of a point in the convex hull of a two-dimensional point set
QuoteRef: toupD1_2011 ;;Toubin, D., Using tracing to diagnose or monitor systems
QuoteRef: towsE7_1979 ;;Towster, E., A convention for explicit declaration of environments and top-down refinement of data
QuoteRef: tranF12_2010 ;;Transier, F., Sanders, P., Engineering basic algorithms of an in-memory text search engine
QuoteRef: tratL9_2007 ;;Tratt, L., Wuyts, R., Dynamically typed languages
QuoteRef: tretJ9_2001 ;;Tretmans, J. et al., Software engineering for formal methods: The development of a storm surge barrier control system. Revisiting seven myths of formal methods
QuoteRef: trevC_1984 ;;Trevarthen, C., How control of movement develops
QuoteRef: treviso_1478 ;;Smith, D.E. (translator), Treviso Arithmetic of 1478 [NewQuotes]
QuoteRef: triaJM8_1980 ;;Triance, J.M., Yow, J.F.S., MCOBOL -- A prototype macro facility for Cobol
QuoteRef: trigRH1_1986 ;;Trigg, R.H., Weiser, M., TEXTNET: A network-based approach to text handling
QuoteRef: trigRH11_1987 ;;Trigg, R.H., Irish, P.M., Hypertext habitats: Experiences of writers in NoteCards
QuoteRef: tripA12_2004 ;;Tripathy, A. et al., Distributed balanced tables: a new approach [NewQuotes]
QuoteRef: trisJB1_2008 ;;Tristan, J.-B., Leroy, X., Formal verification of translation validators. A case study on instruction scheduling optimizations
QuoteRef: trisJB1_2010 ;;Tristan, J.-B., Leroy, X., A simple, valid validator for software pipelining
QuoteRef: trotA1_2003 ;;Trorman, A., Compressing inverted files
QuoteRef: trouJ5_1972 ;;Trout, J., Ries, A., Positioning cuts through chaos in marketplace
QuoteRef: trouJ7_1979 ;;Trout, J., Ries, A., The positioning era: a view ten years later
QuoteRef: trumI10_2017 ;;Trummer, I., Koch, C., Multi-objective parametric query optimization [NewQuotes]
QuoteRef: tsafD10_2009 ;;Tsafrir, D. et al., Minimizing dependencies within generic classes for faster smaller programs
QuoteRef: tschMS10_2005 ;;Tschantz, M.S., Ernst, M.D., Javari: adding reference immutability to Java
QuoteRef: tseyGS9_1979 ;;Tseytin, G.S., From logicism to proceduralism (An autobiographical account)
QuoteRef: tsicD1_1983 ;;Tsichritzis, D., Christodoulakis, S., Message files
QuoteRef: tsuL_300 ;;Tsu, L, Tao Te Ching
QuoteRef: tsurS_1982 ;;Tsuruta, S. et al., A debugging tool for real time software: The non repeated runs approach
QuoteRef: tuckA1_1975 ;;Tucker, A., Very high-level language design: a viewpoint
QuoteRef: tuomI3_1999 ;;Tuomi, I., Data is more than knowledge: implications of the reversed knowledge hierarchy for knowledge management and organizational memory
QuoteRef: turbTN6_1981 ;;Turba, T.N., Checking for spelling and typographical errors in computer-based text.
QuoteRef: turcSR_1115 ;;Turchillus, Simoni de Rotol, Reguncule super Abacum: Due Trattati Inediti D'Abbaco
QuoteRef: turiA3_1951 ;;Turing, A., Programmers' handbook for Manchester electronic computer Mark II, 1st edition
QuoteRef: turiAM11_1936 ;;Turing, A.M., On computable numbers, with an application to the Entscheidungsproblem
QuoteRef: turiAM_1946 ;;Turing, A.M., Letter from Turing to W. Ross Ashby [NewQuotes]
QuoteRef: turiAM2_1946 ;;Turing, A.M., Proposals for development in the mathematics division of an automatic computing engine (ACE)
QuoteRef: turiAM2_1947 ;;Turing, A.M., Lecture to the London Mathematical Society on 20 February 1947
QuoteRef: turiAM9_1947 ;;Turing, A.M., Intelligent machinery
QuoteRef: turiAM6_1949 ;;Turing, A.M., Checking a large routine
QuoteRef: turiAM10_1950 ;;Turing, A.M., Computing machinery and intelligence
QuoteRef: turiAM_1951 ;;Turing, A.M., Intelligent machinery, a heretical theory [NewQuotes]
QuoteRef: turiAM2_1951 ;;Turing, A.M., Undated letter from Turing to Michael Woodger at the National Physical Laboratory [NewQuotes]
QuoteRef: turiAM5_1951 ;;Turing, A.M., Can digital computers think? [NewQuotes]
QuoteRef: turiAM1_1952 ;;Turing, A.M. et al., Can automatic calculating machines be said to think? [NewQuotes]
QuoteRef: turnDA1_1979 ;;Turner, D.A., A new implementation technique for applicative languages
QuoteRef: tursWM10_1981 ;;Turski, W.M., ALGOL 68 revisited twelve years later or from AAD to ADA
QuoteRef: tursWM9_1988 ;;Turski, W.M., Time considered irrelevant for real-time systems
QuoteRef: tursWM10_2003 ;;Turski, W.M., It was fun
QuoteRef: turvMT_1984 ;;Turvey, M.T., Kugler, P.N., An ecological approach to perception and action
QuoteRef: tverA2_1974 ;;Tversky, A., Assessing uncertainty
QuoteRef: tverA9_1974 ;;Tversky, A., Kahneman, D., Judgment under uncertainty: heuristics and biases
QuoteRef: twaiM_1882 ;;Twain, M., Life on the Mississippi [OK]
QuoteRef: tymoT2_1979 ;;Tymoczko, T., The four-color problem and its philosophical significance
QuoteRef: tzimG6_2021 ;;Tzimpragos, G. et al., In-sensor classification with boosted race trees [NewQuotes]
QuoteRef: tzuS_180 ;;Tzu, S., The Art of War
QuoteRef: uenoK9_2011 ;;Ueno, K. et al., An efficient non-moving garbage collector for functional languages
QuoteRef: ungaD1_1992 ;;Ungar, D., Jackson, F., An adaptive tenuring policy for generation scavengers
QuoteRef: ungaD10_1992 ;;Ungar, D. et al., Object, message, and performance: How they coexist in Self
QuoteRef: ungaD4_1997 ;;Ungar, D. et al., Debugging and the experience of immediacy
QuoteRef: ungaD9_2007 ;;Ungar, D., Dynamic languages (in reactive environments) unleash creativity
QuoteRef: ungarD5_1984 ;;Ungar, D., Generation scavenging: A non-disruptive high performance storage reclamation algorithm.
QuoteRef: unkeC1_2008 ;;Unkel, C., Lam, M.S., Automatic inference of stationary fields: a generalization of Java's final fields
QuoteRef: urbaJ7_2019 ;;Urbano, J. et al., Statistical significance testing in information retrieval: an empirical analysis of type I, type II, and type III errors [NewQuotes]
QuoteRef: urdaG1_2011 ;;Urdaneta, G. et al., A survey of DHT security techniques
QuoteRef: urecV10_2013 ;;Ureche, V. et al., Miniboxing: Improving the speed to code size tradeoff in parametric polymorphism translations
QuoteRef: utleAM6_1949 ;;Utley, A.M., et. al., Discussion of plans, projects, and general ideas
QuoteRef: uzelV7_2009 ;;Uzelac, V., Milenkovic, A., A real-time program trace compressor utilizing double move-to-front method
QuoteRef: vachP1_2021 ;;Vachon, P., The identity in everyone's pocket [NewQuotes]
QuoteRef: vafeV1_2015 ;;Vafeiadis, V. et al., Common compiler optimisations are invalid in the C11 memory model and what we can do about it
QuoteRef: valiLG8_1990 ;;Valiant, L.G., A bridging model for parallel computation
QuoteRef: vandB1_1996 ;;Vander Zanden, B., An incremental algorithm for satisfying hierarchies of multiway dataflow constraints [NewQuotes]
QuoteRef: vanhD9_2011 ;;Van Horn, D., Might, M., Abstracting abstract machines: A systematic approach to higher-order program analysis
QuoteRef: vansME_1980 ;;Vansuch, M.E. et al., Computer aided cinematography techniques for model validation
QuoteRef: vanwA_1969 ;;Mailloux, B.J. et al., Report on the algorithmic language Algol 68
QuoteRef: vargG12_1997 ;;Varghese, G., Lauck, A., Hashed and hierarchical timing wheels: efficient data structures for implementing a timer facility
QuoteRef: vaskD_1982 ;;Vaskevitch, D., DIALOGUE: providing total terminal independence
QuoteRef: vaswK1_2007 ;;Vaswani, K. et al., Preferential path profiling: compactly numbering interesting paths
QuoteRef: vaucJG10_1975 ;;Vaucher, J.G., Prefixed procedures: a structuring concept for operations
QuoteRef: veinES5_1999 ;;Veinott, E.S. et al., Video helps remote work: Speakers who need to negotiate common ground benefit from seeing each other
QuoteRef: veneT3_1978 ;;Venema, T., des Rivieres, J., Euclid and Pascal
QuoteRef: venkV9_2005 ;;Venkatachalam, V., Franz, M., Power reduction techniques for microprocessor systems
QuoteRef: ventBH_1989 ;;Venter, B.H., Data structuring via functions
QuoteRef: ventBH7_1991 ;;Venter, B.H., A value can belong to many types
QuoteRef: verbJ3_20 ;;Verbraeken, J. et al., A survey on distributed machine learning [NewQuotes]
QuoteRef: vermR2_2015 ;;Verma, R. et al., Failure-atomic updates of application data in a Linux file system [NewQuotes]
QuoteRef: versD3_1997 ;;Verschaeren, D. et al., On the need for predictable floating-point arithmetic in the programming languages Fortran 90 and C/C++
QuoteRef: vessI7_1984 ;;Vessey, I., Weber, R., Research on structured programming: An empiricist's evaluation
QuoteRef: vessI1_1986 ;;Vessey, I., Weber, R., Structured tools and conditional logic: An empirical investigation
QuoteRef: vienN3_2013 ;;Viennot, N. et al., Transparent mutable replay for multicore debugging and patch validation
QuoteRef: vietF_1591 ;;Viete, F., In artem analyticem isagoge
QuoteRef: viglSD9_2014 ;;Viglas, S.D., Write-limited sorts and joins for persistent memory [NewQuotes]
QuoteRef: vilkJ11_2020 ;;Vilk, J., Berger, E.D., Bleak*: automatically debugging memory leaks in web applications [NewQuotes]
QuoteRef: villA_1220 ;;de Villa Dei, A., de algorismo
QuoteRef: vinbA_1982 ;;Vinberg, A., The importance and futility of device independence in computer graphics
QuoteRef: viotP6_2016 ;;Viotti, P., Vukolic, M., Consistency in non-transactional distributed storage systems [NewQuotes]
QuoteRef: virzRA4_1996 ;;Virzi, R.A. et al., Usability problem identification using both low- and high-fidelity prototypes
QuoteRef: vittJS6_2001 ;;Vitter, J.S., External memory algorithms and data structures: Dealing with massive data
QuoteRef: vixiP4_2015 ;;Vixie, P., Go static or go home
QuoteRef: vlecT7_1989 ;;van Vleck, T., Three questions about each bug you find
QuoteRef: vlisE_2004 ;;van der Vlist, E., RELAX NG
QuoteRef: voKP2_2000 ;;Vo, K.-P., The discipline and method architecture for reusable libraries
QuoteRef: voasF7_1997 ;;Voas, J. et al., Predicting how badly "good" software can behave
QuoteRef: vogeW1_2009 ;;Vogels, W., Eventually consistent
QuoteRef: vollM6_2019 ;;Vollmer, M. et al., LoCal: a language for programs operating on serialized data [NewQuotes]
QuoteRef: voorEA6_1958 ;;Voorhees, E.A., Algebraic formulation of flow diagrams
QuoteRef: voorS8_2006 ;;Voorhies, S. et al., Fair service for mice in the presence of elephants
QuoteRef: vranD10_2014 ;;Vrandecic, D., Krotzsch, M., Wikidata: A free collaborative knowledgebase
QuoteRef: vrviN6_2017 ;;Vrvilo, N. et al., A marshalled data format for pointers in relocatable data blocks [NewQuotes]
QuoteRef: vyotLS_1962 ;;Vyotsky, L.S., Thought and Language
QuoteRef: wadlP2_1985 ;;Wadler, P., A simple language is also a functional language
QuoteRef: wadlP1_1989 ;;Wadler, P., Blott, S., How to make ad-hoc polymorphism less ad hoc
QuoteRef: wadlP_1992 ;;Wadler, P., Comprehending monads
QuoteRef: wadlP12_2015 ;;Wadler, P., Propositions as types
QuoteRef: waghS2_2021 ;;Wagh, S. et al., DP-cryptography: marrying differential privacy and cryptography in emerging applications [NewQuotes]
QuoteRef: wagnF5_1992 ;;Wagner, F., VFSM executable specification
QuoteRef: wagnRA1_1974 ;;Wagner, R.A., Fischer, M.J., The string-to-string correction problem
QuoteRef: wahbR6_1993 ;;Wahbe, R. et al., Practical data breakpoints: design and implementation
QuoteRef: waitWM7_1967 ;;Waite, W.M., A language independent macro processor
QuoteRef: waitWM_1977 ;;Waite, W.M., Theory
QuoteRef: walcK7_2012 ;;Walcott-Justice, K. et al., THeME: a system for testing by hardware monitoring events [NewQuotes]
QuoteRef: waldJ2_1992 ;;Waldo, J., The case for multiple inheritance in C++
QuoteRef: waldJ7_1999 ;;Waldo, J., The Jini architecture for network-centric computing
QuoteRef: waldJ8_2008 ;;Waldo, J., Scaling in games and virtual worlds
QuoteRef: walkD7_2000 ;;Walker, D. et al., Typed memory management via static capabilities
QuoteRef: walkJH11_1987 ;;Walker, J.H., Document Examiner: Delivery interface for hypertext documents
QuoteRef: walkN4_1990 ;;Walker, N., A comparison of selection times from walking and pull-down menus
QuoteRef: wallAR9_1855 ;;Wallace, A.R., On the law which has regulated the introduction of new species
QuoteRef: wallAR8_1858 ;;Wallace, A.R., On the tendency of varieties to depart indefinitely from the original type [OK]
QuoteRef: wallAR1_1865 ;;Wallace, A.R., On the varieties of man in the Malay archipelago
QuoteRef: wallAR_1870 ;;Wallace, A.R., The limits of natural selection as applied to man [OK]
QuoteRef: wallAR_1891 ;;Wallace, A.R., Darwinism. An exposition of the Theory of Natural Selection with some of its Applications [NewQuotes]
QuoteRef: wallJ_1656 ;;Wallis, J., Arithmetica infinitorum [NewQuotes]
QuoteRef: walpJ6_1988 ;;Walpole, J. et al., Maintaining consistency in distributed software engineering environments
QuoteRef: waltES5_1967 ;;Walter, E.S., Wallace, V.L., Further analysis of a computer center environment
QuoteRef: waltPL11_1979 ;;Walton, P.L. et al., Medical guidance and PROMIS
QuoteRef: wangAA8_2006 ;;Wang, A.-I. A. et al., The Conquest file system: better performance through a disk/persistent-RAM hybrid design
QuoteRef: wangDC10_1997 ;;Wang, D.C. et al., The Zephr abstract syntax description language
QuoteRef: wangK3_2011 ;;Wang, K., Rao, J., Rethink the virtual machine template
QuoteRef: wangK4_2017 ;;Wang, K. et al., Graspan: a single-machine disk-based graph system for intraprocedural static analysis of large-scale systems code [NewQuotes]
QuoteRef: wangK3_2018 ;;Wang, K. et al., Hop, skip, &jump [NewQuotes]
QuoteRef: wangL6_2004 ;;Wang, L. et al., Reliability and security in the CoDeeN content distribution network
QuoteRef: wangS3_2018 ;;Wang, S. et al., Understanding and auto-adjusting performance-sensitive configurations [NewQuotes]
QuoteRef: wangW9_1995 ;;Wang, W., Rada, R., Experiences with semantic net based hypermedia
QuoteRef: wangX11_2002 ;;Wang, X. et al., Achieving undo in bitmap-based collaborative graphics editing systems
QuoteRef: wangX3_2016 ;;Wang, X. et al., A differential approach to undefined behavior detection
QuoteRef: wangY1_2009 ;;Wang, Y. et al., The theory of deadlock avoidance via discrete control
QuoteRef: wangY6_2013 ;;Wang, Y. et al., Generating sound and effective memory debuggers
QuoteRef: wangZ11_2018 ;;Wang, Z. et al., Using local clocks to reproduce concurrency bugs [NewQuotes]
QuoteRef: wardDL_1981 ;;Ward, D.L., Embedding an information system within a generalized network environment.
QuoteRef: wareC10_1992 ;;Ware, C. et al., Moving icons as a human interrupt
QuoteRef: warfJS6_2020 ;;Warford, J.S. et al., A calculational deductive system for linear temporal logic [NewQuotes]
QuoteRef: warnJD_1974 ;;Warnier, J.-D., Logical Construction of Programs
QuoteRef: warnJE6_1992 ;;Warnock, J.E., The new age of documents
QuoteRef: warrDH2_1980 ;;Warren, D.H.D., Logic programming and compiler writing
QuoteRef: washJ3_1978 ;;Washburn, J., Communications interface primer
QuoteRef: wasoPC5_1959 ;;Wason, P.C., The processing of positive and negative information
QuoteRef: wassAI_1973 ;;Wasserman, A.I., The design of 'idiot-proof' interactive programs
QuoteRef: wassAI3_1979 ;;Wasserman, A.I., Testing and verification aspects of Pascal-like languages
QuoteRef: wassAI_1983 ;;Wasserman, A.I., Software Engineering Environments
QuoteRef: wassG6_2007 ;;Wassermann, G., Su, Z., Sound and precise analysis of web applications for injection vulnerabilities
QuoteRef: wateRC1_1982 ;;Waters, R.C., The programmer's apprentice: knowledge based program editing
QuoteRef: watsRW_1981 ;;Watson, R.W., Identifiers (naming) in distributed systems
QuoteRef: watsRW5_1987 ;;Watson, R.W., Mamrak, S.A., Gaining efficiency in transport services by appropriate design and implementation choices
QuoteRef: wattC1_2018 ;;Watt, C., Mechanising and verifying the WebAssembly specification [NewQuotes]
QuoteRef: wattJC_1996 ;;Watts, J.C. et al., Voice loops as cooperative aids in space shuttle mission control
QuoteRef: weavAC_1978 ;;Weaver, A.C., A real-time, multi-task programming language for microprocessor-based industrial process control
QuoteRef: webeM2_1980 ;;Weber, M., Bernstein, S.L., Global register allocation for non-equivalent register sets
QuoteRef: weerD3_2010 ;;Weeratunge, D. et al., Analyzing multicore dumps to facilitate concurrency bug reproduction
QuoteRef: weerD10_2011 ;;Weeratunge, D. et al., Accentuating the positive: atomicity inference and enforcement using correct executions
QuoteRef: wegbB_1971 ;;Wegbreit, B., The ECL programming system
QuoteRef: wegbB2_1974 ;;Wegbreit, B., Procedure closure in EL1
QuoteRef: wegbB5_1974 ;;Wegbreit, B., The treatment of data types in EL1
QuoteRef: wegiM3_2008 ;;Wegiel, M., Krintz, C., The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
QuoteRef: wegnE11_1973 ;;Wegner, E., Tree-structured programs
QuoteRef: wegnLM7_1989 ;;Wegner, L.M., Teuhola, J.I., The external heapsort
QuoteRef: wegnP12_1976 ;;Wegner, P., Programming languages--the first 25 years
QuoteRef: wegnP_1979 ;;Wegner, P., Research Directions in Software Technology
QuoteRef: wegnP_1979a ;;Wegner, P., Introduction and Overview
QuoteRef: wegnP_1979b ;;Wegner, P., Programming languages - Concepts and research directions
QuoteRef: wegnP7_1984 ;;Wegner, P., Capital-intensive software technology
QuoteRef: wegnP10_1986 ;;Wegner, P., Classification in object-oriented systems
QuoteRef: wegnP8_1990 ;;Wegner, P., Concepts and paradigms of object-oriented programming
QuoteRef: weidNH4_1975 ;;Weiderman, N.H., Rawson, B.M., Flowcharting loops without cycles
QuoteRef: weigHJ_1949 ;;Weigund, H.J. (editor and translator), Curtius, L. (selections), Goethe. Wisdom and Experience
QuoteRef: weihK9_2002 ;;Weihe, K., Towards improved static safety expressing meaning by type
QuoteRef: weinGM1_1974 ;;Weinberg, G.M., Schulman, E.L., Goals and performance in computer programming
QuoteRef: weinGM_1975 ;;Weinberg, G.M., An Introduction to General Systems Thinking
QuoteRef: weinGM8_1975 ;;Weinberg, G.M. et al., If-then-else considered harmful
QuoteRef: weinGM_1979 ;;Weinberg, G.M., Weinberg, D., On the Design of stable systems
QuoteRef: weinGM_1982 ;;Weinberg, G.M., Rethinking systems analysis and design
QuoteRef: weinGM9_1982 ;;Weinberg, G.M., Weinberg, Overstructured management of software engineering
QuoteRef: weinGM8_1983 ;;Weinberg, G.M., Kill that code
QuoteRef: weisDM2_1985 ;;Weiss, D.M., Basili, V.R., Evaluating software development by analysis of changes: Some data from the Software Engineering Laboratory
QuoteRef: weisHI_2014 ;;Weisberg, H.I., Willful Ignorance: The Mismeasure of Uncertainty [NewQuotes]
QuoteRef: weisM7_1982 ;;Weiser, M., Programmers use slices when debugging
QuoteRef: weisM11_1987 ;;Weiser, M., Source code
QuoteRef: weisM1_1994 ;;Weiser, M., The world is not a desktop
QuoteRef: weisP6_1960 ;;Weiss, P., Knowledge: A growth process
QuoteRef: welcTA6_1984 ;;Welch, T.A., A technique for high-performance data compression
QuoteRef: wellEF9_1993 ;;Weller, E.F., Lessons from three years of inspection data
QuoteRef: wellHG_1938 ;;Wells, H.G., Wells, H.G., World Encyclopaedia
QuoteRef: wellMB4_1964 ;;Wells, M.B., Aspects of language design for combinatorial computing
QuoteRef: welsJ1_1978 ;;Welsh, J., Economic range checks in Pascal
QuoteRef: welsM12_2001 ;;Welsh, M. et al., SEDA: An architecture for well-conditioned scalable internet services
QuoteRef: wenH2_2018 ;;Wen, H., Interval-based memory reclamation [NewQuotes]
QuoteRef: wertH_1981 ;;Wertz, H., Some ideas on the educational use of computers
QuoteRef: wessBD_1965 ;;Wessler, B.D., TracD, A graphic programming language
QuoteRef: wessC_1797 ;;Wessel, C., On the analytical representation of direction. An attempt. Applied chiefly to the solution of plane and spherical polygons [NewQuotes]
QuoteRef: wexeA4_1992 ;;Wexelblat, A., Groups without groupware
QuoteRef: wexeR3_1989 ;;Wexelblat, R., Editor's notes
QuoteRef: weyuEJ12_1986 ;;Weyuker, E.J., Axiomatizing software test data adequacy
QuoteRef: weyuEJ6_1988 ;;Weyuker, E.J., The evaluation of program-based software test data adequacy criteria
QuoteRef: whalJ6_2004 ;;Whaley, J., Lam, M.S., Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
QuoteRef: whalT5_1989 ;;Whalen, T., Patrick, A., Conversational hypertext: Information access through natural language dialogues with computers
QuoteRef: whatR_1857 ;;Whately, R., Bacon's Essays: with Annotations [NewQuotes]
QuoteRef: wheeDJ6_1949 ;;Wheeler, D.J., Planning the use of a paper library
QuoteRef: wheeDJ6_2005 ;;Wheeler, D.J., Needham, R.M., TEA, a tiny encryption algorithm [NewQuotes]
QuoteRef: whitDE4_1986 ;;Whitney, D.E., Real robots don't need jigs
QuoteRef: whitI11_1988 ;;White, I., The limits and capabilities of machines--A review
QuoteRef: whitJ6_1982 ;;Whiteside, J. et al., How do people really use text editors?
QuoteRef: whitJ5_1989 ;;Whiteside, J. (Panel member), The role of laboratory experiments in HCI: Help, hindrance, or ho-hum? (Panel)
QuoteRef: whitJA11_2012 ;;Whittaker, J.A., The 10-minute test plan
QuoteRef: whitJE4_1977 ;;White, J.E., Elements of a distributed programming system
QuoteRef: whitS5_1995 ;;Whittaker, S., Schwarz, H., Back to the future: Pen and paper technology supports complex group coordination
QuoteRef: whitS11_1998 ;;Whittaker, S. et al., The dynamics of mass interaction
QuoteRef: whitS_1999 ;;Whittaker, S., Schwarz, H., Meetings of the board: the impact of scheduling medium on long term group coordination in software development
QuoteRef: whitS6_2001 ;;Whittaker, S., Hirschberg, J., The character, value, and management of personal paper archives
QuoteRef: whorBL4_1940 ;;Whorf, B.L., Science and linguistics [NewQuotes]
QuoteRef: whorBL_1941 ;;Whorf, B.L., The Relation of habitual thought and behavior to language [NewQuotes]
QuoteRef: whorBL2_1941 ;;Whorf, B.L., A brotherhood of thought: Linguistics [NewQuotes]
QuoteRef: whorBL4_1941 ;;Whorf, B.L., Languages and logic [NewQuotes]
QuoteRef: whorBL_1942 ;;Whorf, B.L., Decipherment of the linguistic portion of the Maya hieroglyphs [NewQuotes]
QuoteRef: whorBL_1950 ;;Whorf, B.L., An American Indian model of the universe [NewQuotes]
QuoteRef: whorBL_1953 ;;Whorf, B.L., Linguistic factors in the terminology of Hopi architecture [NewQuotes]
QuoteRef: wichBA_1976 ;;Wichmann, B.A., Ackermann's function: a study in the efficiency of calling procedures
QuoteRef: wichBA5_1977 ;;Wichmann, B.A., How to call procedures, or second thoughts on Ackermann's function
QuoteRef: wickSB7_2011 ;;Wicker, S.B., Cellular telephony and the question of privacy
QuoteRef: wickSB10_2017 ;;Wicker, S.B., Karlsson, K., Internet advertising: technology, ethics, and a serious difference of opinion [NewQuotes]
QuoteRef: wickSB5_2020 ;;Wicker, S.B., Ghosh, D., Reading in the panopticon -- Your Kindle may be spying on you, but you can't be sure [NewQuotes]
QuoteRef: wiecCA3_1982 ;;Wiecek, C.A., A case study of VAX-ll instruction set usage for compiler execution
QuoteRef: wienMJ2_2000 ;;Wiener, M.J., High-speed cryptography with the RSA algorithm
QuoteRef: wierR_1995 ;;Wieringa, R., de Jonge, W., Object identifiers , keys, and surrogates --- object identifiers revisited
QuoteRef: wiesM10_2000 ;;Wiesmann, M. et al., Database replication techniques: a three parameter classification
QuoteRef: wiggE_1975 ;;Wigginton, Eliot, Moments: The Foxfire Experience
QuoteRef: wignEP2_1960 ;;Wigner, E.P., The unreasonable effectiveness of mathematics in the natural sciences
QuoteRef: wijb5_1998 ;;Wijbrans, K.C.J. et al., Practical experiences in the BOS project
QuoteRef: wilcJR2_2018 ;;Wilcox, J.R. et al., VerifiedFT: a verified, high-performance precise dynamic race detector [NewQuotes]
QuoteRef: wildE6_2009 ;;Wilde, E., Roy, A., Web site metadata
QuoteRef: wileDS11_1973 ;;Wile, D.S., A generative, nested sequential basis for general purpose programming language
QuoteRef: wilhR2_2014 ;;Wilhelm, R., Grund, D., Computation takes time, but how much?
QuoteRef: wilhR3_2020 ;;Wilhelm, R., Determining reliable and precise execution time bounds of real-time software [NewQuotes]
QuoteRef: wilkK6_2000 ;;Wilken, K. et al., Optimal instruction scheduling using integer programming
QuoteRef: wilkL_2005 ;;Wilkinson, L., The Grammar of Graphics
QuoteRef: wilkM10_1990 ;;Wilkes, M., It's all software, now
QuoteRef: wilkMV_1951 ;;Wilkes, M.V. et al., Preparation of programs for an electronic digital computer, with special reference to the EDSAC and the use of a library of subroutines
QuoteRef: wilkMV_1957 ;;Wilkes, M.V. et al., Preparation of programs for an electronic digital computer, Second Edition
QuoteRef: wilkMV7_1975 ;;Wilkes, M.V., Early computer developments at Cambridge: The EDSAC
QuoteRef: wilkMV10_1975 ;;Wilkes, M.V., How Babbage's dream came true
QuoteRef: wilkMV_1985 ;;Wilkes, M.V., Memoirs of a computer pioneer
QuoteRef: wilkMV8_1986 ;;Wilkes, M.V., EMPIRIC A sketch of a programming language designed to facilitate a fine grain of protection
QuoteRef: wilkVW8_1992 ;;Wilkes, V.W., Artificial intelligence as the year 2000 approaches
QuoteRef: willA4_2008 ;;Williams, A., Optimizing math-intensive applications with fixed-point arithmetic
QuoteRef: willC4_2001 ;;Williams, C., SCRAM: Software configuration, release, and management
QuoteRef: willD10_2008 ;;Willis, D. et al., Caching and incrementalisation in the Java Query Language
QuoteRef: willD3_2011 ;;Williams, D. et al., Overdriver: handling memory overload in an oversubscribed cloud
QuoteRef: willFC9_1948 ;;Williams, F.C., Kilburn, T., Electronic digital computers
QuoteRef: willG2_1983 ;;Williams, G., The Lisa computer system
QuoteRef: willG12_1987 ;;Williams, G., HyperCard
QuoteRef: willHE3_1999 ;;Williams, H.E., Zobel, J., Compressing integers for fast file access
QuoteRef: willHE10_2004 ;;Williams, H.E. et al., Fast phrase querying with combined indexes
QuoteRef: willJW4_1964 ;;Williams, J.W.J., The Elliot simulator package
QuoteRef: willK12_2003 ;;Willets, K., Full-text searching & the Burrows-Wheeler transform
QuoteRef: willL7_2000 ;;Williams, L. et al., Strengthening the case for pair programming
QuoteRef: willMD12_1980 ;;Williams, M.D., Hollan, J.D., The process of retrieval from very long term memory
QuoteRef: willRA12_1977 ;;Williamson, R.A. Jr., Communicating with programmers FAST
QuoteRef: willS4_2009 ;;Williams, S. et al., Roofline: An insightful visual performance model for multicore architectures
QuoteRef: willTR4_1992 ;;Williams, T.R., Farkas, D.K., Minimalism reconsidered: Should we design documentation for exploratory learning?
QuoteRef: wilsGV_1995 ;;Wilson, G.V., Practical parallel programming
QuoteRef: wilsPR9_1992 ;;Wilson, P.R., Uniprocessor garbage collection techniques
QuoteRef: wilsPR9_1995 ;;Wilson, P.R. et al., Dynamic storage allocation: a survey and critical review
QuoteRef: wilsPR6_1999 ;;Wilson, P.R. et al., The case for compressed caching in virtual memory systems
QuoteRef: wilsS3_2008 ;;Wilson, S., Public key superstructure "It's PKI Jim, but not as we know it!"
QuoteRef: wiltS10_2000 ;;Wiltamuth, S., The C# programming language
QuoteRef: wincS_1998 ;;Winchester, S., The Professor and the Madman
QuoteRef: wingJM10_2021 ;;Wing, J.M., Trustworthy AI [NewQuotes]
QuoteRef: winkJF8_1992 ;;Winkler, J.F.H., Objectivism: "class" considered harmful, letter to the editor
QuoteRef: winnRI10_1984 ;;Winner, R.I., Unassigned objects
QuoteRef: winoT7_1979 ;;Winograd, T., Beyond programming languages
QuoteRef: winoT_1986 ;;Winograd, T., Flores, F., Understanding Computers and Cognition
QuoteRef: winoT1_1987 ;;Winograd, T., Flores, F., On Understanding Computers and Cognition ... A response to the reviews
QuoteRef: winoT4_1987 ;;Winograd, T., Thinking machines: Can there be? Are we?
QuoteRef: wintJ7_2011 ;;Winther, J., Guarded type promotion [NewQuotes]
QuoteRef: wintP8_1997 ;;Winterbottom, P., Pike, R., The design of the Inferno virtual machine
QuoteRef: wintPH_2017 ;;Winston, P.H., On computing machinery and intelligence [NewQuotes]
QuoteRef: wirfR7_2006 ;;Wirfs-Brock, R., Designing for recovery
QuoteRef: wirtN1_1966 ;;Wirth, N., Weber, H., EULER: A generalization of ALGOL, and its formal definition: Part I
QuoteRef: wirtN6_1966 ;;Wirth, N., Hoare, C.A.R., A contribution to the development of ALGOL
QuoteRef: wirtN5_1967 ;;Wirth, N., On certain basic concepts of programming languages
QuoteRef: wirtN1_1968 ;;Wirth, N., PL360, a programming language for the 360 computer
QuoteRef: wirtN1_1971 ;;Wirth, N., The programming language Pascal
QuoteRef: wirtN4_1971 ;;Wirth, N., Program development by stepwise refinement
QuoteRef: wirtN7_1973 ;;Wirth, N., The Programming Language PASCAL (Revised Report)
QuoteRef: wirtN3_1976 ;;Wirth, N., Programming languages: what to demand and how to asses them. Professor Cleverbyte's visit to heaven
QuoteRef: wirtN8_1977 ;;Wirth, N., Toward a discipline of real-time programming
QuoteRef: wirtN4_1988 ;;Wirth, N., Type extensions
QuoteRef: wirtN7_1988 ;;Wirth, N., From Modula to Oberon
QuoteRef: wirtN9_1989 ;;Wirth, N., Gutknecht, J., The Oberon system
QuoteRef: wittIH6_1987 ;;Witten, I.H. et al., Arithmetic coding for data compression
QuoteRef: wittIH_1991 ;;Witten, I.H. et al., Indexing and compressing full-text databases for CD-ROM
QuoteRef: wittIH_1994 ;;Witten, I.H. et al., Managing gigabytes: compressing and indexing documents and images
QuoteRef: wittL_1939 ;;Wittgenstein, L., Wittgenstein's Lectures on the Foundations of Mathematics. Cambridge, 1939: from the notes of R.G. Bosanquet, Norman Malcolm, Rush Rhees, and Yorick Smythies
QuoteRef: wittL_1958 ;;Wittgenstein, L., The blue and brown books
QuoteRef: wittL_1958a ;;Wittgenstein, L., Philosophical Investigations
QuoteRef: wittL_1967 ;;Wittgenstein, L., Zettel
QuoteRef: wittRW9_1977 ;;Witty, R.W., Dimensional flowcharting
QuoteRef: wobbE2_1994 ;;Wobber, E. et al., Authentication in the Taos operating system
QuoteRef: wolfHB11_2017 ;;Wolfe, H.B., The mobile phone as surveillance device: progress, perils, and protective measures [NewQuotes]
QuoteRef: wolfT_2016 ;;Wolfe, T., The Kingdom of Speech [NewQuotes]
QuoteRef: wolfW9_1989 ;;Wolf, W., A practical comparison of two object-oriented languages
QuoteRef: woltN_1960 ;;Wolterstoff, N., Qualities
QuoteRef: wongL9_1995 ;;Wong, L., An introduction to Remy's fast polymophic record projection
QuoteRef: wongL9_2000 ;;Wong, L, The functional guts of the Kleisli query system
QuoteRef: woodM5_1983 ;;Woodward, M., DiGiammarino, P.F., A case for adaptable applications software
QuoteRef: woodSR6_1981 ;;Wood, S.R., Z-The 95% program editor
QuoteRef: woodWA_1975 ;;Woods, W.A., What's in a link? Foundations for semantic networks
QuoteRef: woolB8_1986 ;;Woolf, B. et al., Teaching a complex industrial process
QuoteRef: woolJD_1973 ;;Woolley, J.D., On the efficiency of extensible languages
QuoteRef: wootD_2015 ;;Wootton, D., The Invention of Science. A New History of the Scientific Revolution
QuoteRef: wordA3_1997 ;;Worden, a. et al., Making computers easier for older adults to use: Area cursors and sticky icons
QuoteRef: wuC5_2008 ;;Wu, C., Liu, Y., Queuing network modeling of transcription typing
QuoteRef: wuPC6_1997 ;;Wu, P.-C., Multiplicative, congruential random-number generators with multiplier +- 2^k1 +- 2^k2 and modulus 2^p - 1
QuoteRef: wulfW_1975 ;;Wulf, W. et al., The Design of an optimizing compiler
QuoteRef: wulfWA10_1971 ;;Wulf, W.A. et al., Reflections on a systems programming language
QuoteRef: wulfWA12_1971 ;;Wulf, W.A. et al., Bliss: a language for systems programming
QuoteRef: wulfWA4_1974 ;;Wulf, W.A., ALPHARD toward a language to support structured programming
QuoteRef: wulfWA6_1976 ;;Wulf, W.A. et al., Abstraction and verification in Alphard: Introduction to language and methodology
QuoteRef: wulfWA_1977 ;;Wulf, W.A., Languages and structured programs
QuoteRef: wulfWA_1977a ;;Wulf, W.A., Some thoughts on the next generation of programming languages
QuoteRef: wyboN4_1990 ;;Wybolt, A., Experiences with C++ and object-oriented software development
QuoteRef: wyclJ_1368 ;;Wyclif, J., Tractatus de Universalibus [NewQuotes]
QuoteRef: xiQ6_2010 ;;Xi, Q., Walker, D., A context-free markup language for semi-structured text
QuoteRef: xiaoT5_2014 ;;Xiao, T. et al., Nondeterminism in MapReduce considered harmful? An empirical study on non-commutative aggregators in MapReduce programs
QuoteRef: xiaoX6_2014 ;;Xiao, X. et al., Persistent pointer information
QuoteRef: xieC10_2015 ;;Xie, C. et al., High-performance ACID via modular concurrency control [NewQuotes]
QuoteRef: xionH6_2019 ;;Xiong, H. et al., A survey of group key agreement protocols with constant rounds [NewQuotes]
QuoteRef: xlrg8_1981 ;;The Xerox Learning Research Group, The smalltalk-80 system
QuoteRef: xuG6_2009 ;;Xu, G. et al., Go with the flow: profiling copies to find runtime bloat
QuoteRef: xuG6_2010 ;;Xu, G. et al., Finding low-utility data structures
QuoteRef: xuG10_2013 ;;Xu, G., Resurrector: A tunable object lifetime profiling technique for optimizing real-world programs
QuoteRef: xuH9_2021 ;;Xu, H. et al., Memory-safety challenge considered solved? An in-depth study of all Rust CVEs [NewQuotes]
QuoteRef: xuJ12_1991 ;;Xu, J., Parnas, D.L., On satisfying timing constraints in hard-real-time systems
QuoteRef: xuJ1_1993 ;;Xu, J., Parnas, D.L., On satisfying timing constraints in hard-real-time systems
QuoteRef: xuT7_2015 ;;Xu, T., Zhou, Y., Systems approaches to tackling configuration errors: a survey
QuoteRef: xuZ6_2000 ;;Xu, Z. et al., Safety checking of machine code
QuoteRef: xuanJ1_2019 ;;Xuan, J. et al., A survey of Bayesian nonparametric learning [NewQuotes]
QuoteRef: yageT10_1990 ;;Yager, T., What's NeXT after 1-2-3? [First Impressions]
QuoteRef: yahaR5_1993 ;;Yahalom, R. et al., Trust relations in secure systems--A distributed authentication perspective
QuoteRef: yamaT11_1998 ;;Yamaura, T., How to design practical test cases
QuoteRef: yangBS3_2005 ;;Yang, B.-S. et al., Lightweight monitors for the Java virtual machine
QuoteRef: yangC3_2016 ;;Yang, C., Mellor-Crummey, J., A wait-free queue as fast as fetch-and-add
QuoteRef: yangC8_2016 ;;Yang, C. et al., Hierarchical program paths [NewQuotes]
QuoteRef: yangJ12_2011 ;;Yang, J., Hawblitzel, C., Safe to the last instruction: Automated verification of a type-safe operating system
QuoteRef: yangK5_2016 ;;Yang, K. et al., A2: analog malicious hardware [NewQuotes]
QuoteRef: yangK9_2017 ;;Yang, K. et al., Exploiting the analog properties of digital circuits for malicious hardware [NewQuotes]
QuoteRef: yangX6_2009 ;;Yang, X. et al., Eliminating the call stack to save RAM
QuoteRef: yangX6_2011 ;;Yang, X. et al., Finding and understanding bugs in C compilers
QuoteRef: yangX7_2016 ;;Yang, X. et al., A fast boot, fast shutdown technique for Android OS devices
QuoteRef: yankN10_1985 ;;Yankelovich, N. et al., Reading and writing the electronic book
QuoteRef: yankN1_1988 ;;Yankelovich, N. et al., Intermedia: The concept and the construction of a seamless information environment
QuoteRef: yankN11_2004 ;;Yankelovich, N. et al., Meeting central: making distributed meetings more effective
QuoteRef: yapCK1_1997 ;;Yap, C.-K., Towards exact geometric computation [NewQuotes]
QuoteRef: yarvC6_1993 ;;Yarvin, C. et al., Anonymous RPC: Low-latency protection in a 64-bit address space
QuoteRef: yeeB1_2010 ;;Yee, B., et al, Native client: A sandbox for portable, untrusted x86 native code
QuoteRef: yeeKP12_2002 ;;Yee, K.P., User interaction design for secure systems
QuoteRef: yiJ2_2011 ;;Yi, J. et al., Cooperative reasoning for preemptive execution
QuoteRef: yonkMD10_1975 ;;Yonke, M.D., A knowledgeable, language-independent system for program construction and modification
QuoteRef: yoonMK4_2016 ;;Yoon, M.-K. et al., PIFT: predictive information-flow tracking
QuoteRef: yoonY5_2015 ;;Yoon, Y., Myers, B.A., Supporting selective undo in a code editor [NewQuotes]
QuoteRef: younAL7_2017 ;;Young, A.L., Yung, M., Cryptovirology: the birth, neglect, and explosion of ransomware [NewQuotes]
QuoteRef: younEJ3_1992 ;;Younger, E.J., Bennett, K.H., Functional approach to mathematical model of naming
QuoteRef: younG_1988 ;;Younggren, G., Using an object-oriented programming language to create audience-driven hypermedia environments
QuoteRef: younY6_2012 ;;Younan, Y. et al., Runtime countermeasures for code injection attacks against C and C++ programs
QuoteRef: yuJ10_2012 ;;Yu, J. et al., Maple: A coverage-driven testing tool for multithreaded programs
QuoteRef: yuJ12_2021 ;;Yu, J. et al., Speculative taint tracking (STT): A comprehensive protection for speculatively accessed data [NewQuotes]
QuoteRef: yuanD3_2010 ;;Yuan, D. et al., SherLog: error diagnosis by connecting clues from run-time logs
QuoteRef: yuanD2_2012 ;;Yuan, D. et al., Improving software diagnosability via log enhancement
QuoteRef: yuanD6_2012 ;;Yuan, D. et al., Characterizing logging practices in open-source software
QuoteRef: yueS10_2021 ;;Yue, S., Katabi, D., Liquid testing with your smartphone [NewQuotes]
QuoteRef: yuvaG3_1977 ;;Yuval, G., Is your register really necessary
QuoteRef: zafaF6_2010 ;;Zafar, F. et al., GPU random numbers via the tiny encryption algorithm
QuoteRef: zahaM4_2012 ;;Zaharia, M. et al., Resilient distributed datasets: a fault-tolerant abstraction for in-memory cluster computing [NewQuotes]
QuoteRef: zahaM11_2016 ;;Zaharia, M. et al., Apache Spark: a unified engine for big data processing
QuoteRef: zahnCT_1974 ;;Zahn, C.T. Jr., A control statement for natural top-down structured programming
QuoteRef: zakrAD_1969 ;;Zakrevskii, A.D., Description of LYaPAS
QuoteRef: zandBT11_2005 ;;Zanden, B.T.Z. et al., Lessons learned from programmers' experiences with one-way constraints
QuoteRef: zaniC3_1982 ;;Zaniolo, C., Database relations with null values [NewQuotes]
QuoteRef: zappF11_2018 ;;Zappa Nardelli, F. et al., Julia subtyping: a rational reconstruction [NewQuotes]
QuoteRef: zaveP4_2012 ;;Zave, P., Using lightweight modeling to understand Chord
QuoteRef: zdonSB10_1986 ;;Zdonik, S.B., Maintaining consistency in a database with changing types
QuoteRef: zdonSB11_1986 ;;Zdonik, S.B., Why properties are objects or some refinements of "is-a"
QuoteRef: zeemEC4_1976 ;;Zeeman, E.C., Catastrophe Theory
QuoteRef: zeldN11_2011 ;;Zeldovich, N. et al., Making information flow explicit in HiStar
QuoteRef: zelkMV9_1973 ;;Zelkowitz, M.V., Reversible execution
QuoteRef: zelkMV1_1974 ;;Zelkowitz, M.V., Optimiztion of structured programs
QuoteRef: zellA11_2001 ;;Zeller, A., Automated debugging: Are we close?
QuoteRef: zellA2_2002 ;;Zeller, A., Hildebrandt, R., Simplifying and isolating failure-inducing input
QuoteRef: zemaH3_1966 ;;Zemanek, H., Semiotics and programming languages
QuoteRef: zemaH9_1979 ;;Zemanek, H., Al-Khorezmi. His background, his personality, his work, and his influence
QuoteRef: zendO10_1997 ;;Zendra, O. et al., Efficient dynamic dispatch without virtual function tables. The SmallEiffel compiler
QuoteRef: zengQ6_2011 ;;Zeng, Q. et al., Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures
QuoteRef: zermE19_1908 ;;Zermelo, E., Investigations in the foundations of set theory I
QuoteRef: zezuP10_1991 ;;Zezula, P. et al., Dynamic partitioning of signature files
QuoteRef: zhaiS9_2012 ;;Zhai, S., Kristensson, P.O., The word-gesture keyboard: Reimagining keyboard interaction
QuoteRef: zhanC3_2021 ;;Zhang, C. et al., Understanding deep learning (still) requires rethinking generalizations [NewQuotes]
QuoteRef: zhanI10_2015 ;;Zhang, I. et al., Building consistent transactions with inconsistent replication [NewQuotes]
QuoteRef: zhanL3_2018 ;;Zhang, L. et al., Analysis of SSL certificate reissues and revocations in the wake of Heartbleed [NewQuotes]
QuoteRef: zhanQ10_2014 ;;Zhang, Q. et al., Efficient subcubic alias analysis for C
QuoteRef: zhanQ6_2017 ;;Zhang, Q. et al., Skeletal program enumeration for rigorous compiler testing [NewQuotes]
QuoteRef: zhanT4_2017 ;;Zhang, T. et al., ProRace: practical data race detection for production use [NewQuotes]
QuoteRef: zhanW3_2011 ;;Zhang, W. et al., ConSeq: Detecting concurrency bugs through sequential errors
QuoteRef: zhanW3_2013 ;;Zhang, W. et al., ConMem: Detecting crash-triggering concurrency bugs through an effect-oriented approach
QuoteRef: zhanX9_2005 ;;Zhang, X., Gupta, R., Whole execution traces and their applications
QuoteRef: zhanX5_2006 ;;Zhang, X. et al., Locating faults through automated predicate switching
QuoteRef: zhanY1_2010 ;;Zhang, Y. et al., Fast tridiagonal solvers on the GPU
QuoteRef: zhanY6_2015 ;;Zhang, Y. et al., Lightweight, flexible object-oriented generics
QuoteRef: zhaoH10_2012 ;;Zhao, H., et. al., The HipHop compiler for PHP
QuoteRef: zhaoJ10_2006 ;;Zhao, J. et al., Cardinality computing: a new step towards fully representing multi-sets by Bloom filters [NewQuotes]
QuoteRef: zhaoM9_2018 ;;Zhao, M. et al., Emotion recognition using wireless signals [NewQuotes]
QuoteRef: zhaoQ6_2010 ;;Zhao, Q. et al., Efficient memory shadowing for 64-bit architectures
QuoteRef: zhenX1_2008 ;;Zheng, X., Rugina, R., Demand-driven alias analysis for C
QuoteRef: zhenYF4_1987 ;;Zheng, Y.F. et al., Motion coordination of two industrial robots and their controlling computer systems
QuoteRef: zhonY8_2009 ;;Zhong, Y. et al., Program locality analysis using reuse distance
QuoteRef: zhuX11_2015 ;;Zhu, X. et al., An analysis of programming language statement frequency in C, C++, and Java source code [NewQuotes]
QuoteRef: zhuYK9_2010 ;;Zhu, Y.-K., Hayes, W.B., Algorithm 908: online exact summation of floating-point streams
QuoteRef: zhurS11_2012 ;;Zhuravlev, S. et al., Survey of scheduling techniques for addressing shared resources in multicore processors
QuoteRef: zibiY10_2001 ;;Zibin, Y., Gil, J.(Y.), Efficient subtyping tests with PQ-encoding
QuoteRef: zibiY11_2002 ;;Zibin, Y., Gil, J.(Y.), Fast algorithm of creating space efficient dispatching tables with application to multi-dispatching
QuoteRef: ziegEW4_1974 ;;Ziegler, E.W., An introduction to the UMTA specification language
QuoteRef: ziffP_1960 ;;Ziff, P., Semantic Analysis
QuoteRef: zimaJM_1968 ;;Ziman, J.M., Public Knowledge, An essay concerning the social dimension of science
QuoteRef: zimmJA2_1981 ;;Zimmer, j.a., A control form for complex iterations
QuoteRef: zimmPR_1995 ;;Zimmermann, P.R., The official PGP user's guide
QuoteRef: zipfGK_1949 ;;Zipf, G.K., Human Behavior and the principle of least effort
QuoteRef: zippJ6_2001 ;;Zipperer, J., Sweat the Easy Stuff [interview with Peter S. Tippett of TruSecure Corp]
QuoteRef: zivJ5_1977 ;;Ziv, J., Lempel, A., A universal algorithm for sequential data compression
QuoteRef: zivJ9_1978 ;;Ziv, J., Lempel, A., Compression of individual sequences via variable-rate coding
QuoteRef: zobeJ8_1995 ;;Zobel, J., Moffat, A., Adding compression to a full-text retrieval system
QuoteRef: zobeJ12_2001 ;;Zobel, J. et al., In-memory hash tables for accumulating text vocabularies
QuoteRef: zobeJ11_2005 ;;Zobel, J., Askitis, N., Cache-conscious collision resolution in string hash tables
QuoteRef: zobeJ7_2006 ;;Zobel, J., Moffat, A., Inverted files for text search engines
QuoteRef: zobeJ_2014 ;;Zobel, J., Writing for Computer Science [NewQuotes]
QuoteRef: zohaA9_2015 ;;Zohar, A., Bitcoin: under the hood
QuoteRef: zongQ2_2002 ;;Zongyan, Q., Bit-vector encoding of n-queen problem
QuoteRef: zuY2_2012 ;;Zu, Y. et al., GPU-based NFA implementation for memory efficient high speed regular expression matching
QuoteRef: zubeKM10_2001 ;;Zuberi, K.M., EMERALDS: a small-memory real-time microkernel
QuoteRef: zuseK_1984 ;;Zuse, K., Der Computer -- Mein Lebenswerk

Related up

ThesaHelp: references a-b
ThesaHelp: references c-d
ThesaHelp: references e-f
ThesaHelp: references g-h
ThesaHelp: references i-l
ThesaHelp: references m-o
ThesaHelp: references p-r
ThesaHelp: references sa-sz

Updated barberCB 4/23
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber