ThesaHelp: ACM references m-z

topic root > Group: all references

all references
ACM references
ACM references a-e
ACM references f-l
ACM references m-z

all Thesa topics


ACM references from 'm' to 'z'
Quotes: up

QuoteRef: maY6_2019 ;;Ma, Y. et al., WiFi sensing with channel state information: A survey [NewQuotes]
QuoteRef: mackIS4_1993 ;;MacKenzie, I.S., Ware, C., Lag as a determinant of human performance in interactive systems
QuoteRef: mackIS5_1999 ;;MacKenzie, I.S., Zhang, S.X., The design and evaluation of a high-performance soft keyboard
QuoteRef: mackRL7_1983 ;;Mack, R.L. et al., Learning to use word processors: Problems and prospects
QuoteRef: mackWE10_1988 ;;Mackay, W.E., Diversity in the use of electronic mail: A preliminary inquiry
QuoteRef: maclBJ12_1982 ;;MacLennan, B.J., Values and objects in programming languages
QuoteRef: maclBJ12_1983 ;;MacLennan, B.J., Abstraction in the Intel iAPX-432 prototype systems implementation language
QuoteRef: madsOL10_1986 ;;Madsen, O.L., Block structure and object oriented languages.
QuoteRef: maesP12_1987 ;;Maes, P., Concepts and experiments in computational reflection
QuoteRef: magaA3_2021 ;;Magalhaes, A. et al., Main memory database recovery: A survey [NewQuotes]
QuoteRef: magaJP9_2011 ;;Magalhaes, J.P., de Haas, W.B., Functional modeling of musical harmony
QuoteRef: maglA2_2015 ;;Maglo, A. et al., 3D mesh compression: survey, comparisons, and emerging trends
QuoteRef: mahaP12_2011 ;;Mahajan, P. et al., Depot: Cloud storage with minimal trust
QuoteRef: mairH9_2013 ;;Mairson, H., Functional geometry and the Traite de Lutherie
QuoteRef: maitS11_2020 ;;Maity, S. et al., BodyWire-HCI: Enabling new interaction modalities by communicating strictly dring touch using electro-quasistatic human body communication [NewQuotes]
QuoteRef: malaD10_2009 ;;Malayeri, D., Aldrich, J., CZ: multiple inheritance without diamonds
QuoteRef: malcM12_1983 ;;Malcolm, M., Dyment, D., Experience designing the Waterloo Port user interface
QuoteRef: maliJS10_2016 ;;Malik, J.S., Hemani, A., Gaussian random number generation: a survey on hardware architectures [NewQuotes]
QuoteRef: malkM3_2015 ;;Malka, M. et al., rIOMMU: Efficient IOMMU for I/O devices that employ ring buffers
QuoteRef: maloTW6_1982 ;;Malone, T.W., How do people organize their desks? Implications for the design of office information systems
QuoteRef: maloTW4_1987 ;;Malone, T.W. et al., Semistructured messages are surprisingly useful for computer-supported coordination
QuoteRef: maloTW5_1987 ;;Malone, T.W. et al., Intelligent information-sharing systems
QuoteRef: maloTW11_1992 ;;Malone, T.W. et al., Experiments with Oval: a radically tailorable tool for cooperative work
QuoteRef: maloTW3_1994 ;;Malone, T.W., Crowston, K., The interdisciplinary study of coordination
QuoteRef: mamrSA5_1987 ;;Mamrak, S.A. et al., A software architecture for supporting the exchange of electronic manuscripts
QuoteRef: manbU4_1997 ;;Manber, U., A text compression scheme that allows fast searching directly in the compressed file
QuoteRef: manbU8_2000 ;;Manber, U. et al., Experience with personalization on Yahoo!
QuoteRef: mannE6_2019 ;;Mannes, E., Maziero, C., Naming content on the network layer: a security analysis of the information-centric network model [NewQuotes]
QuoteRef: mannT5_1994 ;;Mann, T. et al., A coherent distributed file cache with directory write-behind
QuoteRef: mansJ1_2005 ;;Manson, J. et al., The Java memory model
QuoteRef: mansY12_2017 ;;Mansouri, Y. et al., Data storage management in cloud environments: taxonomy, survey, and future directions [NewQuotes]
QuoteRef: mantMJ2_1983 ;;Manthey, M.J., Moret, B.M.E., The computational metaphor and quantum physics
QuoteRef: maoJ4_2016 ;;Mao, J. et al., RID: finding reference count bugs with inconsistent path pair checking
QuoteRef: maraH10_1997 ;;Marais, H., Bharat, K., Supporting cooperative and personal surfing with a desktop assistant
QuoteRef: margG6_2014 ;;Margaritis, G., Anastasiadis, S.V., Incremental text indexing for fast disk-based search [NewQuotes]
QuoteRef: markA4_2016 ;;Markuze, A. et al., True IOMMU protection from DMA attacks: when copy is faster than zero copy
QuoteRef: markG6_2002 ;;Mark, G., Extreme collaboration
QuoteRef: markV6_1982 ;;Markstein, V. et al., Optimization of range checking
QuoteRef: markW1_1981 ;;Mark, W., Use of database organization in the Consul system
QuoteRef: marlS6_2001 ;;Marlow, S. et al., Asynchronous exceptions in Haskell
QuoteRef: marlS9_2004 ;;Marlow, S., Jones, S.P., Making a fast curry: Push/enter vs. eval/apply for higher-order languages
QuoteRef: marrK3_2013 ;;Marriott, K. et al., HTML automatic table layout
QuoteRef: martC3_1998 ;;Martinez, C., Roura, S., Randomized binary search trees
QuoteRef: martJA8_2021 ;;Martin, J. A. A., Gollee, H., Intermittent control as a model of mouse movements [NewQuotes]
QuoteRef: martJJ12_1973 ;;Martin, J.J., The 'Natural' set of basic control structures
QuoteRef: martJJ_1980 ;;Martin, J.J., FAD, a functional programming language that supports abstract data types
QuoteRef: martM10_2005 ;;Martin, M. et al., Finding application errors and security flaws using PQL: a program query language
QuoteRef: martP1_1986 ;;Martin, P., Tsichritzis, D., Complete logical routings in computer mail systems
QuoteRef: mashAJ4_2017 ;;Mashtizadeh, A.J. et al., Towards practical default-on multi-core record/replay [NewQuotes]
QuoteRef: mashJ1_2009 ;;Mashey, J., The long road to 64 bits
QuoteRef: massH10_1987 ;;Massalin, H., Superoptimizer--A look at the smallest program
QuoteRef: mastL10_2015 ;;Mastrangelo, L. et al., Use at your own risk: The Java unsafe API in the wild
QuoteRef: mathU11_2018 ;;Mathur, U. et al., What happens-after the first race? enhancing the predictive power of happens-before based dynamic race detection [NewQuotes]
QuoteRef: matiE4_1993 ;;Matias, E. et al., Half-QWERTY: A one-handed keyboard facilitating skill transfer from QWERTY
QuoteRef: matsND10_2014 ;;Matsakis, N.D. et al., Typed objects in JavaScript
QuoteRef: maurB11_2015 ;;Maurer, B., Fail at scale
QuoteRef: mayeR2_2020 ;;Mayer, R., Jacobsen, H.-A., Scalable deep learning on distributed infrastructures: challenges, techniques, and tools [NewQuotes]
QuoteRef: maziD7_2002 ;;Mazieres, D., Shasha, D., Building secure file systems out of Byzantine storage [NewQuotes]
QuoteRef: mcauAJ2_1994 ;;McAuley, A.J., Weighted sum codes for error detection and their comparison with existing codes
QuoteRef: mccaJ_1960 ;;McCarthy, J., Recursive functions of symbolic expressions and their computation by machines
QuoteRef: mccaJ4_1960 ;;McCarthy, J., Recursive functions of symbolic expressions and their computation by machines
QuoteRef: mccaJ7_1963 ;;McCarthy, J. et al., The linking segment subprogram language and linking loader
QuoteRef: mccrDD4_1982 ;;McCracken, D.D., Jackson, M.A., Life cycle concept considered harmful
QuoteRef: mcinS5_2011 ;;McIntosh, S. et al., An empirical study of build maintenance effort
QuoteRef: mckeP5_2011 ;;McKenzie, P., Weapons of mass assignment
QuoteRef: mckePE7_2013 ;;McKenney, P.E., Structured deferral: synchronization via procrastination
QuoteRef: mckuK3_2010 ;;McKusick, K., Quinlan, S., GFS: Evolution on fast-forward
QuoteRef: mckuMK8_1984 ;;McKusick, M.K. et al., A fast file system for UNIX
QuoteRef: mcleDJ3_1976 ;;Mclead, D.J., High-level domain definition in a relational data-base system
QuoteRef: mcmuT11_2015 ;;McMullen, T., It Probably Works
QuoteRef: mcquD5_1975 ;;McQuillan, D., Transaction diagrams-- a design tool
QuoteRef: meawF10_2012 ;;Meawad, F. et al., Eval Begone! Semi-automated removal of eval from JavaScript programs
QuoteRef: medeA10_2016 ;;Medeiros, A., Dynamics of change: why reactivity matters
QuoteRef: meekB9_1994 ;;Meek, B., A taxonomy of datatypes
QuoteRef: mehtR8_1997 ;;Mehta, R. et al., Techniques for low energy software
QuoteRef: meijE10_2002 ;;Meijer, E., Szyperski, C., Overcoming independent extensibility challenges
QuoteRef: meijE4_2011 ;;Meijer, E., Bierman, G., A co-relational model of data for large shared data banks
QuoteRef: meikS4_2016 ;;Meiklejohn, S. et al., A fistful of Bitcoins: Characterizing payments among men with no names
QuoteRef: melnS6_2011 ;;Melnik, S. et al., Dremel: interactive analysis of web-scale datasets
QuoteRef: memaK6_2016 ;;Memarian, K. et al., Into the depths of C: elaborating the de facto standards
QuoteRef: memaK1_2019 ;;Memarian, K. et al., Exploring C semantics and pointer provenance [NewQuotes]
QuoteRef: menoVS1_2006 ;;Menon, V.S. et al., A verifiable SSA program representation for aggressive compiler optimization
QuoteRef: mercRT6_2021 ;;Mercuri, R.T., Neumann, P.G., The risks of election believability (or lack thereof) [NewQuotes]
QuoteRef: merrG12_1983 ;;Merrill, G., Proofs, program correctness, and software engineering
QuoteRef: merwJ4_2007 ;;van der Merwe, J. et al., A survey on peer-to-peer key management for mobile ad hoc networks
QuoteRef: mesbA6_2012 ;;Mesbah, A., Mirshokraie, S., Automated analysis of CSS rules to support style maintenance
QuoteRef: mesnMP4_2009 ;;Mesnier, M.P. et al., Relative fitness modeling
QuoteRef: meyeB9_1990 ;;Meyer, B., Tools for the new culture: Lessons from the design of the Eiffel libraries
QuoteRef: meyeLA10_2009 ;;Meyerovich, L.A. et al., Flapjax: a programming language for Ajax applications
QuoteRef: mezzG11_2016 ;;Mezzetti, G. et al., Type unsoundness in practice: an empirical study of Dart
QuoteRef: michMM6_2004 ;;Michael, M.M., Scalable lock-free dynamic memory allocation
QuoteRef: midtJ6_2012 ;;Midtgaard, J., Control-flow analysis of functional programs
QuoteRef: midtJ9_2013 ;;Midtgaard, J. et al., Engineering definitional interpreters
QuoteRef: millHD6_1975 ;;Mills, H.D., How to write correct programs and know it
QuoteRef: millLJ_1981 ;;Miller, L.J., The ISO reference model of open systems interconnection: a First tutorial
QuoteRef: milnR1_1993 ;;Milner, R., Elements of interaction
QuoteRef: miloDS9_2000 ;;Milojicic, D.S. et al., Process Migration
QuoteRef: miltS8_2008 ;;Matched, S. et al., Decentralized access control in distributed file systems
QuoteRef: minJK8_2006 ;;Min, J.-K. et al., A compressor for effective archiving, retrieval, and updating of XML documents
QuoteRef: minsY11_2012 ;;Minsky, Y., OCaml for the masses
QuoteRef: miraE11_1999 ;;Miranda, E., Context management in VisualWorks 5i [NewQuotes]
QuoteRef: miraE6_2015 ;;Miranda, E., Bera, C., A partial read barrier for efficient support of live object-oriented programming
QuoteRef: mitcJ3_1976 ;;Mitchell, J., Wegbreit, B., A next step in data structuring for programming languages
QuoteRef: mitcJ4_1989 ;;Mitchell, J., Shneiderman, B., Dynamic versus static menus: An exploratory comparison
QuoteRef: mitcN9_2012 ;;Mitchell, N., Shake before building. Replacing Make with Haskell
QuoteRef: mitcN11_2013 ;;Mitchell, N., Leaking space
QuoteRef: mitrNJ1_2013 ;;Mitra, N.J. et al., Illustrating how mechanical assemblies work
QuoteRef: mockA7_2002 ;;Mockus, A. et al., Two case studies of open source software development: Apache and Mozilla
QuoteRef: mockA5_2003 ;;Mockus, A. et al., Understanding and predicting effort in software projects
QuoteRef: moffA10_1996 ;;Moffat, A., Zobel, J., Self-indexing inverted files for fast text retrieval
QuoteRef: moffA12_2008 ;;Moffat, A., Zobel, J., Rank-based precision for measurement of retrieval effectiveness
QuoteRef: moffA8_2019 ;;Moffat, A., Huffman coding [NewQuotes]
QuoteRef: moffA7_2020 ;;Moffat, A., Petri, M., Large-alphabet semi-static entropy coding via asymmetric numeral systems [NewQuotes]
QuoteRef: moffDV7_1981 ;;Moffat, D.V., A model for PASCAL-like typing
QuoteRef: moguJC8_1997 ;;Mogul, J.C., Ramakrishnan, K.K., Eliminating receive livelock in an interrupt-driven kernel
QuoteRef: mohaC3_1992 ;;Mohan, C. et al., ARIES: A transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging [NewQuotes]
QuoteRef: mokhA9_2016 ;;Mokhov, A. et al., Non-recursive make considered harmful. Build systems at scale
QuoteRef: mokhA9_2018 ;;Mokhov, A. et al., Build systems a la carte [NewQuotes]
QuoteRef: moliR3_1990 ;;Molich, R., Nielsen, J., Improving a human-computer dialogue
QuoteRef: monaF8_2022 ;;Monaco, F., Color blind accessibility manifesto [NewQuotes]
QuoteRef: monnD5_2008 ;;Monniaux, D., The pitfalls of verifying floating-point computations
QuoteRef: monsC1_2012 ;;Monsanto, C. et al., A compiler and run-time system for network programming languages
QuoteRef: montP3_2009 ;;Montesinos, P. et al., Capo: a software-hardware interface for practical deterministic multiprocessor replay
QuoteRef: mooeCN8_1965 ;;Mooers, C.N., TRAC, a text handling language
QuoteRef: moreDV7_1983 ;;Moreland, D.V., Human factors guidelines for terminal interface design
QuoteRef: morrA11_16 ;;Morrison, A., Scaling synchronization in multicore programs
QuoteRef: morrA2_2013 ;;Morrison, A., Afek, Y., Fast concurrent queues for x86 processors
QuoteRef: morrG1_1998 ;;Morrisett, G. et al., From system F to typed assembly language
QuoteRef: morrJH8_1972 ;;Morris, J.H., Jr., Wells, M.B., The specification of program flow in Madcap 6
QuoteRef: morrJH1_1973 ;;Morris, J.H. Jr., Protection in programming languages
QuoteRef: morrJH10_1973 ;;Morris, J.H. Jr., Types are not sets
QuoteRef: morrJH_1980 ;;Morris, J.H. et al., Experience with an applicative string processing language
QuoteRef: morrR11_1979 ;;Morris, R., Thompson, K., Password security: A case history
QuoteRef: mossCD1_1980 ;;Moss, C.D.S., Structured programming with LOOP statements
QuoteRef: mottL10_2018 ;;Mottola, L., Whitehouse, K., Fundamental concepts of reactive control for autonomous drones [NewQuotes]
QuoteRef: mounM9_2019 ;;Mountantonakis, M., Tzitzikas, Y., Large-scale semantic integration of linked data: a survey [NewQuotes]
QuoteRef: mourES8_1998 ;;de Moura, E.S. et al., Fast searching on compressed text allowing errors
QuoteRef: muchSS_1976 ;;Muchnick, S.S., The command interpreter and command language design of the COM-SHARE Commander II system
QuoteRef: mulaW7_2018 ;;Mula, W., Lemire, D., Faster base64 encoding and decoding using AVX2 instructions [NewQuotes]
QuoteRef: mullJK8_1983 ;;Mullin, J.K., A second look at bloom filters
QuoteRef: muraFU4_2017 ;;Muram, F.U. et al., Systematic review of software behavioral model consistency checking [NewQuotes]
QuoteRef: murpB11_2004 ;;Murphy, B., Automating software failure reporting
QuoteRef: murtTP7_1991 ;;Murtagh, T.P., An improved storage management scheme for block structured languages
QuoteRef: muscR10_2008 ;;Muschevici, R. et al., Multiple dispatch in practice
QuoteRef: muslK5_2014 ;;Muslu, K. et al., Transition for centralized to decentralized version control systems: a case study on reasons, barriers, and outcomes
QuoteRef: musuM6_2014 ;;Musuvathi, M., Safety-first approach to memory consistency models
QuoteRef: myerB3_2000 ;;Myers, B. et al., Past, present, and future of user interface software tools
QuoteRef: myerBA7_1990 ;;Myers, B.A., A new model for handling input
QuoteRef: myerBA11_1991 ;;Myers, B.A., Separating application code from toolkits: Eliminating the spaghetti of call-backs.
QuoteRef: myerBA11_1998 ;;Myers, B.A. et al., Collaboration using multiple PDAs connected to a PC
QuoteRef: mytkT6_2010 ;;Mytkowicz, T. et al., Evaluating the accuracy of Java profilers
QuoteRef: mytkT10_2010 ;;Mytkowicz, T. et al., Inferred call path profiling
QuoteRef: mytkT3_2014 ;;Mytkowicz, T. et al., Data-parallel finite-state machines
QuoteRef: nagaS6_2009 ;;Nagarakatte, S. et al., SoftBound: highly compatible and complete spatial memory safety for C
QuoteRef: nagaS6_2010 ;;Nagakatte, S. et al., CETS: compiler-enforced temporal safety for C
QuoteRef: naikM6_2006 ;;Naik, M. et al., Effective static race detection for Java
QuoteRef: naikM1_2007 ;;Naik, M., Aiken, A., Conditional must not aliasing for static race detection
QuoteRef: nakaH10_2001 ;;Nakamura, H., Incremental computation of complex object queries
QuoteRef: nakaT6_2010 ;;Nakaike, T., Michael, M.M., Lock elision for read-only critical sections in Java
QuoteRef: nanaJ12_1988 ;;Nanard, J. et al., Conceptual documents: A mechanism for specifying active views in hypertext
QuoteRef: naraA12_2017 ;;Narayanan, A., Clark, J., Bitcoin's academic pedigree [NewQuotes]
QuoteRef: naraG3_2016 ;;Narayanaswamy, G. et al., The virtues of conflict: analysing modern concurrency
QuoteRef: naraS6_2007 ;;Narayanasamy, S. et al., Automatically classifying benign and harmful data races using replay analysis
QuoteRef: nashD1_2018 ;;Nashat, D., Amer, A.A., A comprehensive taxonomy of fragmentation and allocation techniques in distributed database design [NewQuotes]
QuoteRef: nasrR6_2012 ;;Nasre, R., Exploiting the structure of the constraint graph for efficient points-to analysis
QuoteRef: nassI8_1973 ;;Nassie, I., Schneiderman, B., Flowchart techniques for structured programming
QuoteRef: naurP1_1963 ;;Naur P. et al., Revised report on the algorithmic language Algol 60
QuoteRef: navaG3_2001 ;;Navarro, G., A guided tour to approximate string matching
QuoteRef: navaG4_2007 ;;Navarro, G., Makinen, V., Compressed full-text indexes
QuoteRef: navaG9_2020 ;;Navarro, G., Rojas-Ledesma, J., Predecessor search [NewQuotes]
QuoteRef: navaG2_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part II: Compressed indexes [NewQuotes]
QuoteRef: navaG3_2021 ;;Navarro, G., Indexing highly repetitive string collections, Part I: Repetitiveness measures [NewQuotes]
QuoteRef: necuGC5_2005 ;;Necula, G.C. et al., CCured: Type-safe retrofitting of legacy software
QuoteRef: needD12_2010 ;;Needell, D., Tropp, J.A., CoSaMP: Iterative signal recovery from incomplete and inaccurate samples
QuoteRef: needRM11_1977 ;;Needham, R.M., Birrell, A.D., The Cap filing system
QuoteRef: needRM12_1978 ;;Needham, R.M., Schroeder, M.D., Using encryption for authentication in large networks of computers
QuoteRef: neelN3_2010 ;;Neelakantam, N. et al., A real system evaluation of hardware atomicity for software speculation
QuoteRef: neelPM_1973 ;;Neely, P.M., On program control structure
QuoteRef: negaS2_2011 ;;Negara, S. et al., Inferring ownership transfer for efficient message passing
QuoteRef: nejmBA2_1988 ;;Nejmeh, B.A., The design of a PDL environment
QuoteRef: nelsTH8_1965 ;;Nelson, T.H., A file structure for the complex, the changing and the indeterminate
QuoteRef: neumPG4_1994 ;;Neumann, P.G., Risks of passwords
QuoteRef: neviGV9_2007 ;;Neville-Neil, G.V., The next big thing (Kode Vicious)
QuoteRef: newcC4_2015 ;;Newcombe, C. et al., How Amazon web services uses formal methods
QuoteRef: newfD11_1998 ;;Newfield, d. et al., Scratchpad: Mechanisms for better navigation in directed web searching
QuoteRef: nguyD3_2011 ;;Nguyen, D., Pingali, K., Synthesizing concurrent schedulers for irregular algorithms
QuoteRef: nguyK3_2018 ;;Nguyen, K. et al., Skyway: connecting managed heaps in distributed big data systems [NewQuotes]
QuoteRef: nguyTV5_2005 ;;Nguyen, T.V.N., Irigoin, F., Efficient and effective array bound checking
QuoteRef: nicoA2_2009 ;;Nicolau, A. et al., Techniques for efficient placement of synchronization primitives
QuoteRef: nielJ3_1990 ;;Nielsen, J., The art of navigating through hypertext
QuoteRef: nielJP3_2016 ;;Nielsen, J.P., Karlsson, S., A scalable lock-free hash table with open addressing
QuoteRef: nienK11_2016 ;;Nienhuis, K. et al., An operational semantics for C/C++11 concurrency [NewQuotes]
QuoteRef: nikhRS10_2011 ;;Nikhil, R., Abstraction in hardware system design
QuoteRef: nipkT1_1998 ;;Nipkow, T., von Oheimb, D., Javalight is type-safe -- definitely
QuoteRef: noonM6_2016 ;;Noonan, M. et al., Polymorphic type inference for machine code
QuoteRef: nordB3_1976 ;;Nordstrom, B., An outline of a mathematical model for the definition and manipulation of data
QuoteRef: normDA4_1993 ;;Norman, D.A., Using names as identifiers
QuoteRef: nourIR9_2021 ;;Nourbakhsh, I.R., AI ethics: A call to faculty [NewQuotes]
QuoteRef: novaG6_2007 ;;Novark, G. et al., Exterminator: automatically correcting memory errors with high probability
QuoteRef: novaG6_2009 ;;Novark, G. et al., Efficiently and precisely locating memory leaks and bloat
QuoteRef: ntziG10_2015 ;;Ntzik, G., Gardner, P., Reasoning about the POSIX file system
QuoteRef: nuneD11_2016 ;;Nunez, D. et al., Prioritized garbage collection: explicit GC support for software caches [NewQuotes]
QuoteRef: nygaK10_1983 ;;Nygaard, K., talk at ACM Annual Conference
QuoteRef: nygaK10_1986 ;;Nygaard, K., Basic concepts in object oriented programming
QuoteRef: nystN10_2011 ;;Nystrom, N. et al., Firepile: run-time compilation for GPUs in Scala
QuoteRef: ocalR8_2020 ;;O'Callahan, R. et al., To catch a failure: The record-and-replay approach to debugging [NewQuotes]
QuoteRef: oderM10_2005 ;;Odersky, M., Zenger, M., Scalable component abstractions [NewQuotes]
QuoteRef: oderM4_2014 ;;Odersky, M., Rompf, T., Unifying functional and object-oriented programming with Scala
QuoteRef: ogatK10_2010 ;;Ogata, K. et al., A study of Java's non-Java memory
QuoteRef: oharK3_1997 ;;O'Hara, K., Sellen, a., A comparison of reading paper and on-line documents
QuoteRef: oheaP2_2019 ;;O'Hearn, P., Separation logic [NewQuotes]
QuoteRef: oiwaY6_2009 ;;Oiwa, Y., Implementation of the memory-safe full ANSI-C compiler
QuoteRef: oldeRR5_1985 ;;Oldehoeft, R.R., Allan, S.J., Adaptive exact-fit storage management
QuoteRef: olinR1_2006 ;;Olinsky, R. et al., Staged allocation: a compositional technique for specifying and implementing procedure calling conventions
QuoteRef: olivO6_2015 ;;Olivo, O. et al., Static detection of asymptotic performance bugs in collection traversals
QuoteRef: olseKA8_2012 ;;Olsen, K.A., Nordhaug, H.F., Internet elections: Unsafe in any home?
QuoteRef: olstC9_2003 ;;Olston, C., Chi, E.H., ScentTrails: integrating browsing and searching on the web
QuoteRef: omanPW5_1990 ;;Oman, P.W., Cook, C.R., Typographic style is more than cosmetic
QuoteRef: omarC10_2016 ;;Omar, C., Aldrich, J., Programmable semantic fragments. The design and implementation of typy
QuoteRef: oppeDC7_1983 ;;Oppen, D.C., Dalal, Y.K., The clearinghouse: A decentralized agent for locating named objects in a distributed environment
QuoteRef: oreJP2_2021 ;;Ore, J.-P. et al., An empirical study on type annotations: Accuracy, speed, and suggestion effectiveness [NewQuotes]
QuoteRef: osteE6_2016 ;;Osterlund, E., Lowe, W., Block-free concurrent GC: Stack scanning and copying
QuoteRef: ostrTJ7_2002 ;;Ostrand, T.J., Weyuker, E.J., The distribution of faults in a large industrial software system
QuoteRef: osulB9_2009 ;;O'Sullivan, B., Making sense of revision-control systems
QuoteRef: ottJ2_2021 ;;Ott, J. et al., BioScript: programming safe chemistry on laboratories-on-a-chip [NewQuotes]
QuoteRef: ottoD11_2006 ;;Ottoni, D. et al., Offset assignment using simultaneous variable coalescing
QuoteRef: oustJ7_2018 ;;Ousterhout, J., Always measure one level deeper [NewQuotes]
QuoteRef: oustJK2_1980 ;;Ousterhout, J.K. et al., Medusa: an experiment in distributed operating system structure
QuoteRef: ozI3_2019 ;;Oz, I., Arslan, S., A survey of multithreading alternatives for soft error fault tolerance [NewQuotes]
QuoteRef: paleL12_1997 ;;Palen, L., Groupware adoption & adaptation: studies of successful use
QuoteRef: panH6_2010 ;;Pan, H. et al., Composing parallel software efficiently with Lithe
QuoteRef: pancP6_2015 ;;Panchekha, P. et al., Automatically improving accuracy for floating point expressions
QuoteRef: pannF10_2005 ;;Panneton, F., L'Ecuyer, P., On the xorshift random number generators [NewQuotes]
QuoteRef: panwA3_2018 ;;Panwar, A. et al., Making huge pages actually useful [NewQuotes]
QuoteRef: papaG3_2020 ;;Papadakis, G. et al., Blocking and filtering techniques for entity resolution: a survey [NewQuotes]
QuoteRef: parkCS2_2012 ;;Park, C.-S., Sen, K., Concurrent breakpoints
QuoteRef: parkE3_2011 ;;Park, E. et al., Fast and space-efficient virtual machine checkpointing
QuoteRef: parkH3_2013 ;;Park, H. et al., Regularities considered harmful: Forcing randomness to memory accesses to reduce row buffer conflicts for multi-core, multi-bank systems
QuoteRef: parkR7_1978 ;;Parkin, R., On the use of keywords for passing procedure parameters
QuoteRef: parkS3_2009 ;;Park, S. et al., CTrigger: exposing atomicity bugs from their hiding places
QuoteRef: parkSK10_1988 ;;Park, S.K., Miller, K.W., Random number generators: Good ones are hard to find
QuoteRef: parkSK7_1993 ;;Park, S.K. et al., [Response to] Remarks on choosing and implementing random number generators
QuoteRef: parlBN3_1975 ;;Parlett, B.N., Wang, Y., The influence of the compiler on the cost of mathematical software
QuoteRef: parnB6_2012 ;;Parno, B., Trust extension for commodity computers
QuoteRef: parnC5_2011 ;;Parnin, C. et al., Java generics adoption: how new features are introduced, championed, or ignored
QuoteRef: parnDL5_1972 ;;Parnas, D.L., A technique for software module specification with examples
QuoteRef: parnDL12_1972 ;;Parnas, D.L., On the criteria to be used in decomposing systems into modules
QuoteRef: parnDL3_1976 ;;Parnas, D.L. et al., Abstract data types defined as classes of variables
QuoteRef: parnDL8_1983 ;;Parnas, D.L., A generalized control structure and its formal definition
QuoteRef: parnDL12_1985 ;;Parnas, D.L., Software aspects of strategic defense systems
QuoteRef: parnDL6_1990 ;;Parnas, D.L. et al., Evaluation of safety-critical software
QuoteRef: parnDL8_2007 ;;Parnas, D.L., Which is riskier: OS diversity or OS monopoly?
QuoteRef: parnDL11_2012 ;;Parnas, D.L., On proving continuity of programs [Letter to the editor]
QuoteRef: parrT6_2011 ;;Parr, T., Fisher, K., LL(*): the foundation of the ANTLR parser generator
QuoteRef: parrT10_2014 ;;Parr, T. et al., Adaptive LL(*) parsing: The power of dynamic analysis
QuoteRef: parsS1_2011 ;;Parsons, S. et al., Auctions and bidding: a guide for computer scientists
QuoteRef: pascJ9_2000 ;;Pascoe, J. et al., Using while moving: HCI issues in fieldwork environments
QuoteRef: pascM11_2004 ;;Pasca, M., Acquisition of categorized named entities for web search
QuoteRef: patiR2_2019 ;;Patil, R., Modi, C., An exhaustive survey on security concerns and solutions at different components of virtualization [NewQuotes]
QuoteRef: pattDA10_2004 ;;Patterson, D.A., Latency lags bandwidth
QuoteRef: pausR10_1992 ;;Pausch, R. et al., Lessons learned from SUIT, the simple user interface toolkit
QuoteRef: pearDJ4_21 ;;Pearce, D.J., A lightweight formalism for reference lifetimes and borrowing in Rust [NewQuotes]
QuoteRef: pearPK6_1990 ;;Pearson, P.K., Fast hashing of variable-length text strings
QuoteRef: pengT4_2007 ;;Peng, T. et al., Survey of network-based defense mechanisms countering the DoS and DDoS problems
QuoteRef: pereFMQ6_2008 ;;Pereira, F.M.Q., Palsberg, J., Register allocation by puzzle solving
QuoteRef: perlK11_1998 ;;Perlin, K., Quikwriting: Continuous stylus-based text entry
QuoteRef: perrRH10_1979 ;;Perrott, R.H., A language for array and vector processors
QuoteRef: pestS10_2010 ;;Pestov, S. et al., Factor: a dynamic stack-based programming language
QuoteRef: peteJL12_1980 ;;Peterson, J.L., Computer programs for detecting and correcting spelling errors
QuoteRef: petrF11_2009 ;;Petrini, F. et al., SCAMPI: a scalable CAM-based algorithm for multiple pattern inspection
QuoteRef: petrM6_1995 ;;Petre, M., Why looking isn't always seeing: readership skills and graphical programming
QuoteRef: pettK6_1990 ;;Pettis, K., Hansen, R.C., Profile guided code positioning
QuoteRef: pfisGF6_1976 ;;Pfister, G.F., A high level language extension for creating and controlling dynamic pictures
QuoteRef: pibiGE4_2017 ;;Pibiri, G.E., Venturini, R., Clustered elias-fano indexes [NewQuotes]
QuoteRef: pibiGE8_2017 ;;Pibiri, G.E., Venturini, R., Efficient data structures for massive n-gram datasets [NewQuotes]
QuoteRef: pibiGE2_2019 ;;Pibiri, G.E., Venturini, R., Handling massive n-gram datasets efficiently [NewQuotes]
QuoteRef: pillTS10_2015 ;;Pillai, T.S. et al., Crash Consistency
QuoteRef: pittT7_1987 ;;Pittman, T., Two-level hybrid interpreter/Native code execution for combined space-time program efficiency
QuoteRef: pizlF6_2007 ;;Pizlo, F. et al., Hierarchical real-time garbage collection
QuoteRef: plaiC4_1996 ;;Plaisant, C. et al., LifeLines: visualizing personal histories
QuoteRef: plasR6_1999 ;;Plasmeijer, R., van Eekelen, M., Keep it CLEAN: a unique approach to functional programming
QuoteRef: platC6_2006 ;;von Platen, C., Eker, J., Feedback linking, optimizing object code layout for updates
QuoteRef: pluqF10_2009 ;;Pluquet, F. et al., Executing code in the past: efficient in-memory object graph versioning
QuoteRef: podgA7_1993 ;;Podgurski, A., Pierce, L., Retrieving reusable software by sampling behavior
QuoteRef: poleM9_1999 ;;Poletto, M., Sarkar, V., Linear scan register allocation
QuoteRef: poloHN_1980 ;;Polovino, H.N. et al., A computer-based coding scheme for research data
QuoteRef: poolPC10_1969 ;;Poole, P.C., Waite, W.W., Machine independent software
QuoteRef: portDE3_2011 ;;Porter, D.E. et al., Rethinking the library OS from the top down
QuoteRef: postJB1_1988 ;;Postel, J.B. et al., An experimental multimedia mail system
QuoteRef: postSW7_1978 ;;Postma, S.W., FEA* A formal English subset of algebra/assertions
QuoteRef: poweB6_2019 ;;Powers, B. et al., Mesh: compacting memory management for C/C++ applications [NewQuotes]
QuoteRef: pradM10_2014 ;;Pradel, M. et al., EventBreak: Analyzing the responsiveness of user interfaces through performance-guided test generation
QuoteRef: pratP1_2011 ;;Pratikakis, P. et al., Locksmith: practical static race detection for C
QuoteRef: pratV1_1983 ;;Pratt, V., Five paradigm shifts in programming language design and their realization in Viron, a dataflow programming language
QuoteRef: pratVR_1980 ;;Pratt, V.R., On specifying verifiers
QuoteRef: precL10_1999 ;;Prechelt, L., Comparing Java vs. C/C++ efficiency differences to interpersonal differences
QuoteRef: prenCJ8_1972 ;;Prenner, C.J. et al., An implementation of backtracking for programming language
QuoteRef: pricAM2_1984 ;;Price, A.M. de A., Defining dynamic variables and abstract data types in Pascal
QuoteRef: proeTA1_1995 ;;Proebsting, T.A., Optimizing an ANSI C interpreter with superoperators
QuoteRef: prokA2_2018 ;;Prokopec, A., Cache-tries: concurrent lock-free hash tries with constant-time operations [NewQuotes]
QuoteRef: prokGB10_2008 ;;Prokopski, G.B., Verbrugge, C., Analyzing the performance of code-copying virtual machines
QuoteRef: prywNS10_1979 ;;Prywes, N.S. et al., Use of a nonprocedureal specification language and associated program generator in software development
QuoteRef: puenJPB9_2017 ;;Puente, J.P.B., Persistence for the masses: RRB-Vectors in a systems language [NewQuotes]
QuoteRef: pughW6_1990 ;;Pugh, W., Skip lists: a probabilistic alternative to balanced trees
QuoteRef: pughW6_1990a ;;Pugh, W., Weddell, G., Two-directional record layout for multiple inheritance
QuoteRef: pughW6_1999 ;;Pugh, W., Fixing the Java memory model
QuoteRef: puglSJ6_2007 ;;Puglisi, S.J. et al., A taxonomy of suffix array construction algorithms
QuoteRef: puliO9_2017 ;;Pulido-Prieto, O., Juarez-Martinez, U., A survey of naturalistic programming techniques [NewQuotes]
QuoteRef: qiD6_2012 ;;Qi, D. et al., DARWIN: An approach to debugging evolving programs
QuoteRef: qiuZ9_1997 ;;Qiu, Z., Static head notes in the operations of dynamic structures
QuoteRef: quinV8_2007 ;;Quint, V., Vatton, I., Editing with style [NewQuotes]
QuoteRef: rabiH8_1984 ;;Rabich, H., letter to the editor
QuoteRef: rabkA5_2011 ;;Rabkin A., Katz, R., Static extraction of program configuration options
QuoteRef: radeC3_1997 ;;Rader, C. et al., Degrees of comprehension: Children's understanding of a visual Programming environment
QuoteRef: radiG1_1965 ;;Radin, G., Royway, H.P., Highlights of a new programming language
QuoteRef: ragaJ1_2018 ;;Ragan-Kelly, J. et al., Halide: decoupling algorithms from schedules for high-performance image processing [NewQuotes]
QuoteRef: rainM1_1973 ;;Rain, M., Operation expressions in Mary
QuoteRef: ramaKK5_1990 ;;Ramakrishnan, K.K., Raj Jain, A binary feedback scheme for congestion avoidance in computer networks
QuoteRef: ramaMV6_1989 ;;Ramakrishna, M.V., Larson, P.-A., File organization using composite perfect hashing
QuoteRef: ramsHR6_1983 ;;Ramsey, H.R. et al., Flowcharts versus program design languages: An experimental comparison
QuoteRef: ramsN5_1997 ;;Ramsey, N., Fernandez, M.F., Specifying representations of machine instructions
QuoteRef: ramsN6_2000 ;;Ramsey, N., Peyton Jones, S., A single intermediate language that supports multiple implementations of exceptions
QuoteRef: ramsN9_2005 ;;Ramsey, N., Dias, J., An applicative control-flow graph based on Huet's zipper
QuoteRef: rashRF11_1986 ;;Rashid, R.F., From RIG to Accent to Mach: The evolution of a network operating system
QuoteRef: raskJ2_1997 ;;Raskin, J., Looking for a humane interface: Will computers ever become easy to use?
QuoteRef: rathA2_1991 ;;Rathi, A. et al., Performance comparison of extendible hashing and linear hashing techniques
QuoteRef: rathED10_1976 ;;Rather, E.D., Moore, C.H., The Forth approach to operating systems
QuoteRef: rathED_1996 ;;Rather, E.D. et al., The evolution of Forth, with transcript of presentation
QuoteRef: rathS5_2015 ;;Parallel processing with Promises, Communications of the ACM
QuoteRef: rattJ3_1982 ;;Rattner, J., Hardware/Software cooperation in the iAPX-432
QuoteRef: rayD1_2012 ;;Ray, D., Ligatti, J., Defining code-injection attacks
QuoteRef: rayc10_2013 ;;Raychev, V. et al., Effective race detection for event-driven programs
QuoteRef: raymDR7_1988 ;;Raymond, D.R., Tompa, F.W., Hypertext and the Oxford English Dictionary,
QuoteRef: redeDD2_1980 ;;Redell, D.D. et al., Pilot: an operating system for a personal computer
QuoteRef: reedDP2_1979 ;;Reed, D.P., Kanodia, R.K., Synchronization with event counts and sequencers
QuoteRef: regeJ6_2005 ;;Regehr, J., Duongsaa, U., Preventing interrupt overload
QuoteRef: reghF2_2019 ;;Feghenzani, F. et al., The real-time Linux kernel: A survey on PREEMPT_RT [NewQuotes]
QuoteRef: reicC6_1991 ;;Reichenberger, C., Delta storage for arbitrary non-text files
QuoteRef: reicC10_2010 ;;Reichenbach, C. et al., What can the GC compute efficiently? A language for heap assertions at GC time
QuoteRef: reidBK_1980 ;;Reid, B.K., A high-level approach to computer document formatting
QuoteRef: reidJK6_1980 ;;Reid, J.K., Functions for manipulating floating-point numbers
QuoteRef: reinJ11_1971 ;;Reinfelds, J., A concept by concept description of the AMTRAN language
QuoteRef: reisSP5_2008 ;;Reiss, S.P., Tracking source locations
QuoteRef: remyD6_1992 ;;Remy, D., Efficient representation of extensible records
QuoteRef: renBM6_2016 ;;Ren, B.M., Foster, J.S., Just-in-time static type checking for dynamic languages
QuoteRef: reneR10_1988 ;;van Renesse, R. et al., Performance of the world's fastest distributed operating system
QuoteRef: reneR2_2015 ;;van Renesse, R., Altinbuken, D., Paxos made moderately complex
QuoteRef: resnM11_2009 ;;Resnick, M., et al, Scratch: programming for all
QuoteRef: rettM4_1994 ;;Rettig, M., Prototyping for tiny fingers
QuoteRef: reynJC_1965 ;;Reynolds, J.C., An introduction to the Cogent programming system
QuoteRef: reynJC5_1970 ;;Reynolds, J.C., Gedanken-- a simple typeless language based on the p? of completeness and the reference concept
QuoteRef: reynJC8_1972 ;;Reynolds, J.C., Definitional interpreters for higher-order programming languages
QuoteRef: reynRG11_1987 ;;Reynolds, R.G., The partial metrics system: Modeling the stepwise refinement process using partial metrics
QuoteRef: richF12_1977 ;;Richard, F., Ledgard, H.F., A reminder for language designers
QuoteRef: richG1_2010 ;;Richards, G. et al., An analysis of the dynamic behavior of JavaScript programs
QuoteRef: richH7_1985 ;;Richter, H., Noncorrecting syntax error recovery
QuoteRef: richJT11_2014 ;;Richards, J.T. et al., A decade of progress in parallel programming productivity
QuoteRef: ridjD6_1983 ;;Ridjanovic, D., Brodie, M.L., Action and transaction skeletons: High level language constructs for database transactions
QuoteRef: ridoJ5_2010 ;;Ridoux, J., Veitch, D., Principles of robust timing over the Internet
QuoteRef: riefE9_2000 ;;Rieffel, E., Polak, W., An introduction to quantum computing for non-physicists
QuoteRef: riggM3_2018 ;;Rigger, M. et al., An analysis of x86-64 inline assembly in C programs [NewQuotes]
QuoteRef: rinaM6_2004 ;;Rinard, M. et al., Enhancing availability and security through failure-oblivious computing
QuoteRef: ritcDM_1996 ;;Ritchie, D.M., The development of the C programming language, with transcript of presentation
QuoteRef: rizzL3_2012 ;;Rizzo, L., Revisiting network I/O APIs: The netmap framework
QuoteRef: robiM1_2000 ;;Robinson, M. et al., Diary as dialogue in papermill process control
QuoteRef: rochJA6_1989 ;;Rochlis, J.A., Eichin, M.W., With microscope and tweezers: The worm form MIT's perspective
QuoteRef: rodrNR8_1993 ;;Rodriguez, N. de La Rocque et al., Types in School
QuoteRef: rohdWF12_1979 ;;Rohde, W.F., Language tools for data access... Past, present and future
QuoteRef: rompT10_2010 ;;Rompf, T., Odersky, M., Lightweight modular staging: A pragmatic approach to runtime code generation and compiled DSLs [NewQuotes]
QuoteRef: rompT1_2013 ;;Rompf, T. et al., Optimizing data structures in high-level programs
QuoteRef: rompT8_2015 ;;Rompf, T., Amin, N., Functional pearl: A SQL to C compiler in 500 lines of code
QuoteRef: roseBK1_1988 ;;Rosen, B.K. et al., Global value numbers and redundant computations
QuoteRef: roseM2_1992 ;;Rosenblum, M., Ousterhout, J.K., The design and implementation of a log-structured file system
QuoteRef: rossCJ1_2010 ;;Rossbach, C.J. et al., Is transactional programming actually easier?
QuoteRef: rossDT3_1961 ;;Ross, D.T., A generalized technique for symbol manipulation and numerical calculation
QuoteRef: rossDT_1967 ;;Ross, D.T., The AED approach to generalized computer aided design
QuoteRef: rossDT11_1976 ;;Ross, D.T., Homilies for humble standards
QuoteRef: rothJ12_2002 ;;Rothe, J., Some facets of complexity theory and cryptography: a five-lecture tutorial
QuoteRef: rothMA12_1988 ;;Roth, M.A. et al., Extended algebra and calculus for nested relational databases
QuoteRef: rounKA10_2013 ;;Roundy, K.A., Miller, B.P., Binary-code obfuscations in prevalent packer tools
QuoteRef: rubiAD12_2002 ;;Rubin, A.D., Security considerations for remote electronic voting
QuoteRef: rugiR3_2005 ;;Rugina, R., Rinard, M.C., Symbolic bounds analysis of pointers, array indices, and accessed memory regions
QuoteRef: ruprA3_2018 ;;Ruprecht, A. et al., VM live migration at scale [NewQuotes]
QuoteRef: rushA7_1986 ;;Rushinek, A., Rushinek, S.F., What makes users happy?
QuoteRef: rushJ12_1991 ;;Rushby, J., von Henke, F., Formal verification of algorithms for critical systems
QuoteRef: rymaJW3_1982 ;;Rymarczyk, J.W., Coding guidelines for pipelined processors
QuoteRef: ryzhL4_2008 ;;Ryzhyk, L. et al., Dingo: taming device drivers [NewQuotes]
QuoteRef: ryzhL8_2010 ;;Ryzhyk, L. et al., The case for active device drivers
QuoteRef: sachP9_1995 ;;Sachs, P., Transforming work: Collaboration, learning, and design
QuoteRef: sackH1_1968 ;;Sackman, H. et al., Exploratory experimental studies comparing online and offline programming performance
QuoteRef: sahoSK3_2013 ;;Sahoo, S.K. et al., Using likely invariants for automated software fault localization
QuoteRef: saitY3_2005 ;;Saito, Y., Shapiro, M., Optimistic replication
QuoteRef: sakrSS10_2013 ;;Sakr, S.S. et al., The family of MapReduce and large-scale data processing systems
QuoteRef: saltG7_1986 ;;Salton, G., Another look at automatic text-retrieval systems
QuoteRef: saltJH11_1984 ;;Saltzer, J.H. et al., End-to-end arguments in system design
QuoteRef: samaM10_2014 ;;Samak, M., Ramanathan, M.K., Multithreaded test synthesis for deadlock detection
QuoteRef: samaM11_2016 ;;Samak, M. et al., Directed synthesis of failing concurrent executions [NewQuotes]
QuoteRef: sameK2_1960 ;;Samelson, K., Bauer, F.L., Sequential formula translation
QuoteRef: sammJE5_1962 ;;Sammet, J.E., Basic elements of COBOL 61
QuoteRef: sammJE7_1972 ;;Sammet, J.E., Programming languages: history and future
QuoteRef: sampAD11_1986 ;;Samples, A.D. et al., SOAR: Smalltalk without bytecodes
QuoteRef: samuP12_1991 ;;Samuelson, P., Glushko, R.J., Intellectual property rights for digital library and hypertext publishing systems: An analysis of Xanadu
QuoteRef: sandD1_1982 ;;Sandberg, D., Lithe: A language combining a flexible syntax and classes
QuoteRef: sankS3_1991 ;;Sankar, S., Rosenblum, D.S., Surveyors' Forum: Runtime checking and debugging of formally specified programs
QuoteRef: santDS12_1999 ;;Santry, D.S. et al., Deciding when to forget in the Elephant file system
QuoteRef: santRCM6_2018 ;;Santos, R.C.M. et al., A memory-bounded, deterministic and terminating semantics for the synchronous programming language Ceu [NewQuotes]
QuoteRef: sarkS1_2009 ;;Sarkar, S. et al., The semantics of x86-CC multiprocessor machine code
QuoteRef: sartJB6_2010 ;;Sartor, J.B. et al., Z-rays: divide arrays and conquer speed and flexibility
QuoteRef: satyM8_1989 ;;Satyanarayanan, M., Integrating security in a large distributed system [ExtraQuote]
QuoteRef: savoT5_2016 ;;Savor, T. et al., Continuous deployment at Facebook and OANDA [NewQuotes]
QuoteRef: scafC5_2008 ;;Scaffidi, C. et al., Topes: Reusable abstractions for validating data
QuoteRef: scheRR11_2016 ;;Schell, R.R., Cyber defense triad for where security matters
QuoteRef: scheWN5_2009 ;;Scherer, W.N. III et al., Scalable synchronous queues
QuoteRef: schiR4_1980 ;;Schild, R., Lienhard, H., Real-time programming in PORTAL
QuoteRef: schkE2_2016 ;;Schkufza, E. et al., Stochastic program optimization
QuoteRef: schlT3_2017 ;;Schlossnagle, T., Time, but faster
QuoteRef: schlT7_2021 ;;Schlossnagle, T. et al., Always-on time-series database: keeping up where there's no way to catch up [NewQuotes]
QuoteRef: schnB8_1999 ;;Schneier, B, The uses and abuses of biometrics
QuoteRef: schnFB4_1998 ;;Schneider, F.B., On concurrent programming
QuoteRef: schnM3_1993 ;;Schneider, M., Self-stabilization
QuoteRef: scholF8_2002 ;;Scholer, F. et al., Compression of inverted indexes for fast query evaluation
QuoteRef: schrB2_2011 ;;Schroeder, B. et al., DRAM errors in the wild: a large-scale field study
QuoteRef: schrMD2_1984 ;;Schroeder, M.D. et al., Experience with Grapevine: the growth of a distributed system
QuoteRef: schwJT10_1980 ;;Schwartz, J.T., Ultracomputers
QuoteRef: scowRS3_1982 ;;Scowen, R.S., A standard syntactic metalanguage
QuoteRef: scowRS3_1982b ;;Scowen, R.S., Ciechanowicz, Z.J., Seven sorts of programs
QuoteRef: sculZ1_2017 ;;Scully, Z., Chlipala, A., A program optimization for automatic database result caching [NewQuotes]
QuoteRef: seacRC4_2017 ;;Seacord, R.C., Uninitialized reads [NewQuotes]
QuoteRef: searA3_1994 ;;Sears, A., Shneiderman, B., Split menus: effectively using selection frequency to organize menus
QuoteRef: searR5_2012 ;;Sears, R., Ramakrishnan, R., bLSM: A general purpose log structured merge tree
QuoteRef: senK6_2008 ;;Sen, K., Race directed random testing of concurrent programs
QuoteRef: seoH5_2014 ;;Seo, H. et al., Programmers' build errors: A case study (at Google)
QuoteRef: sethS9_2015 ;;Sethumadhavan, S. et al., Trustworthy hardware from untrusted components
QuoteRef: shahR6_2012 ;;Shahriyar, R. et al., Down for the count? Getting reference counting back in the ring
QuoteRef: shahR10_2013 ;;Shahriyar, R. et al., Taking off the gloves with reference counting Immix
QuoteRef: shamA11_1979 ;;Shamir, A., How to share a secret
QuoteRef: shanAU9_1993 ;;Shankar, A.U., An introduction to assertional reasoning for concurrent systems
QuoteRef: shapM8_1991 ;;Shapiro, M. et al., Robust, distributed references and acyclic garbage collection
QuoteRef: shapMW12_2004 ;;Shapiro, M.W., Self-healing in modern operating systems
QuoteRef: sharR10_2015 ;;Sharma, R. et al., Conditionally correct superoptimization
QuoteRef: shavN3_2011 ;;Shavit, N., Data structures in the multicore age
QuoteRef: shawM3_1976 ;;Shaw, M., Research directions in abstract data structures
QuoteRef: shawM9_1978 ;;Shaw, M. et al., Tartan--Language design for the Ironman requirement: reference manual
QuoteRef: shawM3_1980 ;;Shaw, M., Wulf, W.A., Toward relaxing assumptions in languages and their implementations
QuoteRef: shelBA11_1978 ;;Shell, B.A., Median split trees: a fast lookup technique for frequently occurring keys
QuoteRef: shenT5_2011 ;;Sheng, T. et al., RACEZ: A lightweight and non-invasive race detection tool for production applications
QuoteRef: shenX1_2007 ;;Shen, X. et al., Locality approximation using time
QuoteRef: shewJR5_1996 ;;Shewchuk, J.R., Robust adaptive floating-point geometric predicates
QuoteRef: shiX1_2018 ;;Shi, X. et al., Graph processing on GPUs: a survey [NewQuotes]
QuoteRef: shiY10_2010 ;;Shi, Yao et al., Do I use the wrong definition? DefUse: Definition-use invariants for detecting concurrency and sequential bugs
QuoteRef: shipDW3_1981 ;;Shipman, D.W., The functional data model and the data language DAPLEX
QuoteRef: shneB1_1982 ;;Shneiderman, B., Control flow and data structure documentation: Two experiments
QuoteRef: shneB1_1993 ;;Shneiderman, B., Beyond intelligent machines: just do it!
QuoteRef: shocJF9_1979 ;;Shoch, J.F., An overview of the programming language Smalltalk-72
QuoteRef: shocJF12_1980 ;;Shoch, J.F., Hupp, J.A., Measured performance of an Ethernet local network
QuoteRef: shocJF3_1982 ;;Shoch, J.F., Hupp, J.A., The "Worm" programs--Early experience with a distributed computation
QuoteRef: shotJ1_2013 ;;Shotton, J. et al., Real-time human pose recognition in parts from single depth images
QuoteRef: shuR10_2016 ;;Shu, R. et al., A study of security isolation techniques [NewQuotes]
QuoteRef: shusL11_2015 ;;Shustek, L.,, An interview with Fred Brooks
QuoteRef: sierF5_2020 ;;Sierra-Arriaga, F. et al., Security issues and challenges for virtualization technologies [NewQuotes]
QuoteRef: silbA2_1980 ;;Silberschatz, A., Kieburtz, R.B., The external consistency of abstract data types
QuoteRef: silbA10_1991 ;;Silberschatz, A., Stonebraker, M., Database systems: Achievements and opportunities
QuoteRef: silvC9_1999 ;;Silverstein, C. et al., Analysis of a very large web search engine query log
QuoteRef: simeJ1_2003 ;;Simeon, J., Wadler, P., The essence of XML
QuoteRef: simoB10_2012 ;;Simons, B., Jones, D.W., Internet voting in the U.S.
QuoteRef: singAK4_2017 ;;Singh, A.K. et al., A survey and comparative study of hard and soft real-time dynamic resource allocation strategies for multi-/many-core systems [NewQuotes]
QuoteRef: singJ9_2016 ;;Singh, J., Gupta, V., Text stemming: approaches, applications, and challenges [NewQuotes]
QuoteRef: singSN8_1999 ;;Singh, S.N., Dalal, N.P., Web home pages as advertisements
QuoteRef: siocAC10_1991 ;;Siochi, A.C., Enrich, R.W., Computer analysis of user interfaces based on repetition in transcripts of user sessions
QuoteRef: siteRL12_1978 ;;Sites, R.L., Programming tools: statement counts and procedure timings
QuoteRef: slatBM7_1986 ;;Slator, B.M. et al., Pygmalion at the interface
QuoteRef: smaaB2_2006 ;;Smaalders, B., Performance anti-patterns
QuoteRef: smitCP_1980 ;;Smith, C.P., A software science analysis of programming size
QuoteRef: smitDC7_1994 ;;Smith, D.C. et al., KidSim: programming agents without a programming language
QuoteRef: smitJM1_1981 ;;Smith, J.M., Consistency of models (chairman for session topic)
QuoteRef: smitKE10_1987 ;;Smith, K.E., Zdonik, S.B., Intermedia: A case study of the differences between relational and object-oriented database systems
QuoteRef: smitMD6_2004 ;;Smith, M.D. et al., A generalized algorithm for graph-coloring register allocation
QuoteRef: smitRB10_1995 ;;Smith, R.B. et al., The Self-4.0 user interface: manifesting a system-wide vision of concreteness, uniformity, and flexibility
QuoteRef: smitWR10_1995 ;;Smith, W.R., Using a prototype-based language for user interface: the Newton project's experience
QuoteRef: snodR5_1984 ;;Snodgrass, R., Monitoring in a software development environment: A relational approach
QuoteRef: sockGH7_2009 ;;Sockut, G.H., Iyer, B.R., Online reorganization of databases
QuoteRef: soetQD4_2017 ;;Soetens, Q.D. et al., Changes as first-class citizens: a research perspective on modern software tooling [NewQuotes]
QuoteRef: solaA6_2005 ;;Solar-Lezama, A. et al., Programming by sketching for bit-streaming programs
QuoteRef: soloA12_2018 ;;Solovyev, A. et al., Rigorous estimation of floating-point round-off errors with symbolic Taylor expansions [NewQuotes]
QuoteRef: soloE11_1983 ;;Soloway, E. et al., Cognitive strategies and looping constructs: An empirical study
QuoteRef: soloE5_1984 ;;Soloway, E., A cognitively-based methodology for designing languages/environments/methodologies
QuoteRef: soloE9_1986 ;;Soloway, E., Learning to program = Learning to construct mechanisms and explanations.
QuoteRef: soloY10_2012 ;;Solodkyy, Y. et al., Open and efficient type switch for C++
QuoteRef: soloY10_2013 ;;Solodkyy, Y. et al., Open pattern matching for C++ [NewQuotes]
QuoteRef: soreT6_2016 ;;Sorensen, T, Donaldson, A.F., Exposing errors related to weak memory in GPU applications
QuoteRef: sounN3_1988 ;;Soundararajan, N., Costello, R.L., Responsive sequential processes
QuoteRef: specD3_1982 ;;Spector, D., Minimal overhead garbage collection of complex list structure
QuoteRef: specD1_1983 ;;Spector, D., The simplest functional programming language
QuoteRef: spinD2_2000 ;;Spinellis, D., Reflection as a mechanism for software integrity verification
QuoteRef: spinD5_2008 ;;Spinellis, D., A tale of four kernels
QuoteRef: spooCR4_1986 ;;Spooner, C.R., The ML approach to the readable all-purpose language
QuoteRef: spooD6_2006 ;;Spoonhower, D. et al., Eventrons: a safe programming construct for high-frequency hard real-time applications
QuoteRef: sridV3_2015 ;;Sridharan, V. et al., Memory errors in modern systems: The good, the bad, and the ugly
QuoteRef: srivV6_2011 ;;Srivastava, V. et al., A security policy oracle: Detecting security holes using multiple API implementations
QuoteRef: stalRM6_1981 ;;Stallman, R.M., EMACS The extensible, Customizable Self-documenting display editor
QuoteRef: stallRM6_1981 ;;Stallman, R.M., EMACS: the extensible, customizable self-documenting display editor
QuoteRef: stanC12_1986 ;;Stanfill, C., Kahle, B., Parallel free-text search on the connection machine system
QuoteRef: stanJ6_2013 ;;Stanier, J., Watson, D., Intermediate representations in imperative compilers: A survey
QuoteRef: stanTA12_1971 ;;Standish, T.A., PPL - An extensible language that failed
QuoteRef: stanTA6_1975 ;;Standish, T.A., Extensibility in programming language design
QuoteRef: steeE11_2017 ;;Steel, E. et al., Hootsuite: in pursuit of reactive systems [NewQuotes]
QuoteRef: steeGL11_1977 ;;Steele, G.L.,Jr., Arithmetic shifting considered harmful
QuoteRef: steeGL10_1998 ;;Steele, G.L. Jr., Growing a language. Transcript of videotape
QuoteRef: steeGL10_2014 ;;Steele, G.L. Jr. et al., Fast splittable pseudorandom number generators
QuoteRef: steeGL3_2016 ;;Steele, G.L. Jr., Tristan, J.-B., Adding approximate counters
QuoteRef: stefA11_2013 ;;Stefik, A., Siebert, S., An empirical investigation into programming languages syntax
QuoteRef: stefM1_1987 ;;Stefik, M. et al., Beyond the chalkboard: Computer support for collaboration and problem solving in meetings
QuoteRef: sterTD11_1974 ;;Sterling, T.D., Guidelines for humanizing computerized information systems: A report from Stanley House
QuoteRef: stewG1_2015 ;;Stewart, G. et al., Compositional CompCert
QuoteRef: stoiI_2001 ;;Stoica, I. et al., Chord: A scalable peer-to-peer lookup service for Internet applications
QuoteRef: stonM7_1981 ;;Stonebraker, M., Operating system support for database management
QuoteRef: stotPD12_1988 ;;Stotts, P.D., Furuta, R., Adding browsing semantics to the hypertext model
QuoteRef: stroB_1996 ;;Stroustrup, B., A history of C++: 1979-1991, and transcript of presentation
QuoteRef: stroR10_1986 ;;Strom, R., A comparison of the object-oriented and process paradigms
QuoteRef: stroRE5_1985 ;;Strom, R.E., Yemini, S., The NIL distributed systems programming language: A status report
QuoteRef: stroRE8_1985 ;;Strom, R.E., Yemini, S., Optimistic recovery in distributed systems
QuoteRef: suT10_2016 ;;Su, T. et al., A survey of data-flow testing [NewQuotes]
QuoteRef: suchFM5_2007 ;;Suchanek, F.M. et al., YAGO: a core of semantic knowledge unifying WordNet and Wikipedia [NewQuotes]
QuoteRef: suddEB10_2010 ;;Sudderth, E.B. et al., Nonparametric belief propagation
QuoteRef: sunC12_2000 ;;Sun, C., Undo any operation at any time in group editors
QuoteRef: sunC11_2016 ;;Sun, C. et al., Finding compiler bugs via live code mutation [NewQuotes]
QuoteRef: sunK6_2019 ;;Sun, K. et al., Exploring low-occlusion qwerty soft keyboard using spatial landmarks [NewQuotes]
QuoteRef: sunY2_2018 ;;Ferizovic, D., Belloch, G.epsilon., PAM: parallel augmented maps [NewQuotes]
QuoteRef: sunY6_2021 ;;Sun, Y. et al., Securing internet applications from routing attacks [NewQuotes]
QuoteRef: sundDM8_1990 ;;Sunday, D.M., A very fast substring search algorithm
QuoteRef: suthDF1_2010 ;;Sutherland, D.F., Scherlis, W.L., Composable thread coloring
QuoteRef: suttB9_2005 ;;de Sutter, B. et al., Link-time binary rewriting techniques for program compaction
QuoteRef: suzaN12_1971 ;;Suzaki, N. et al., The implementation of Algol N
QuoteRef: suzuN_1980 ;;Suzuki, N., Analysis of pointer rotation
QuoteRef: swanL7_2008 ;;Swan, L. et al., Making place for clutter and other ideas of home
QuoteRef: swarW7_1982 ;;Swartout, W., Balzer, R., On the inevitable intertwining of specification and implementation
QuoteRef: sweePF5_1998 ;;Sweeney, P.F., Tip, F., A study of dead data members in C++ applications
QuoteRef: sweeRE3_1982 ;;Sweet, R.E., Sandman, J.G. Jr., Empirical analysis of the Mesa instruction set
QuoteRef: sweeRE7_1985 ;;Sweet, R.E., The Mesa programming environment
QuoteRef: swifMM10_2003 ;;Swift, M.M. et al., Improving the reliability of commodity operating systems
QuoteRef: swifMM11_2006 ;;Swift, M.M. et al., Recovering device drivers
QuoteRef: swinDC7_1985 ;;Swinehart, D.C. et al., The structure of Cedar
QuoteRef: symesDM_1975 ;;Symes, D.M., New control structures to aid gotolessness
QuoteRef: taikC2_1982 ;;Tai, K-C, Comments on parameter passing techniques in programming languages
QuoteRef: taivA9_1996 ;;Taivalsaari, A., On the notion of inheritance
QuoteRef: takaH10_2004 ;;Takagi, H. et al., Accessibility designer: visualizing usability for the blind
QuoteRef: takaT8_1980 ;;Takaoka, T., Introduction of history to variables
QuoteRef: tallNR1_2010 ;;Tallent, N.R. et al., Analyzing lock contention in multithreaded applications
QuoteRef: tallS1_2003 ;;Tallarn, S., Gupta, R., Bitwidth aware global register allocation
QuoteRef: taneAS12_1990 ;;Tanenbaum, A.S. et al., Experiences with the Amoeba distributed operating system
QuoteRef: tangH1_2015 ;;Tang, H. et al., Summary-based context-sensitive data-dependence analysis in presence of callbacks
QuoteRef: tangY7_2013 ;;Tang, Y. et al., Information distance between what I said and what it heard
QuoteRef: tapiMA11_1995 ;;Tapia, M.A., Kurtenbach, G., Some design refinements and principles on the appearance and behavior of marking menus
QuoteRef: tardD6_1992 ;;Tarditi, D. et al., No assembly required: compiling Standard ML to C
QuoteRef: tardD10_2000 ;;Tarditi, D., Compact garbage collection tables
QuoteRef: tardD10_2006 ;;Tarditi, D. et al., Accelerator: Using data parallelism to program GPUs for general-purpose uses
QuoteRef: tardO2_2014 ;;Tardieu, O. et al., X10 and APGAS at pentascale
QuoteRef: tarjRE3_1987 ;;Tarjan, R.E., Algorithm design
QuoteRef: tateR1_2013 ;;Tate, R., The sequential semantics of producer effect systems
QuoteRef: teevJ4_2004 ;;Teevan, J. et al., The perfect search engine is not enough: a study of orienteering behavior in directed search
QuoteRef: teevJ7_2007 ;;Teevan, J. et al., Information re-retrieval: Repeat queries in Yahoo's logs
QuoteRef: teevJ9_2008 ;;Teevan, J., How people recall, recognize, and reuse search results
QuoteRef: teitT6_1981 ;;Teitelbaum, T. et al., The Why and wherefore of the Cornell program synthesizer.
QuoteRef: teitT9_1981 ;;Teitelbaum, T., Reps, T., The Cornell program synthesizer: A syntax-directed programming environment
QuoteRef: telG1_1993 ;;Tel, G., Mattern, F., The derivation of distributed termination detection algorithms from garbage collection schemes
QuoteRef: teneA_1980 ;;Tenenbaum, A., Memory utilization efficiency under a class of first-fit algorithms.
QuoteRef: tennRD8_1976 ;;Tennent, R.D., The denotational semantics of programming languages
QuoteRef: tereD6_2014 ;;Terei, D. et al., M^3: High-performance memory management from off-the-shelf components
QuoteRef: terrD12_2013 ;;Terry, D., Replicated data consistency explained through baseball
QuoteRef: tesaG3_1995 ;;Tesauro, G., Temporal difference learning and TD-Gammon
QuoteRef: teuhJ3_1991 ;;Teuhola, J., Wegner, L., Minimal space, average linear time duplicate deletion
QuoteRef: tezuS4_1991 ;;Tezuka, S., L'Ecuyer, P., Efficient and portable combined Tausworthe random number generators
QuoteRef: thamS11_2004 ;;Thammanur, S., Pande, S., A fast, memory-efficient register allocation framework for embedded systems
QuoteRef: theiH6_2001 ;;Theiling, H., Generating decision trees for decoding binaries
QuoteRef: thilM12_2019 ;;Thilakaratne, M. et al., A systematic review of literature-based discovery: general overview, methodology, & statistical analysis [NewQuotes]
QuoteRef: thimH6_1989 ;;Thimbleby, H., [Literate Programming:] A review of Donald C. Lindsay's Text File difference utility, diff
QuoteRef: thomA3_1998 ;;Thomasian, A., Concurrency control: methods, performance, and analysis
QuoteRef: thomB12_2012 ;;Thomas, B. et al., SPDYing up the web
QuoteRef: thomCD11_1993 ;;Thomborson, C.D., Does your workstation computation belong on a vector supercomputer?
QuoteRef: thomDB10_2007 ;;Thomas, D.B. et al., Gaussian random number generators
QuoteRef: thomK8_1984 ;;Thompson, K., Reflections on trusting trust
QuoteRef: thorM1_2000 ;;Thorup, M., Even strongly universal hashing is pretty fast
QuoteRef: thorM7_2017 ;;Thorup, M., Fast and powerful hashing using tabulation [NewQuotes]
QuoteRef: tichWF11_1984 ;;Tichy, W.F., The string-to-string correction problem with block moves
QuoteRef: tigeAS5_2012 ;;Tigelaar, A.S. et al., Peer-to-peer information retrieval: an overview
QuoteRef: tobiS1_2008 ;;Tobin-Hochstadt, S., Felleisen, M., The design and implementation of Typed Scheme [NewQuotes]
QuoteRef: tognB4_1993 ;;Tognazzini, B., Common elements in today's graphical user interfaces: The good, the bad and the ugly
QuoteRef: torlE6_2010 ;;Torlak, E. et al., MemSAT: checking axiomatic specifications of memory models
QuoteRef: torrJ12_2009 ;;Torrellas, J. et al., The bulk multicore architecture for improved programmability
QuoteRef: tranF12_2010 ;;Transier, F., Sanders, P., Engineering basic algorithms of an in-memory text search engine
QuoteRef: triaJM8_1980 ;;Triance, J.M., Yow, J.F.S., MCOBOL -- A prototype macro facility for Cobol
QuoteRef: trigRH1_1986 ;;Trigg, R.H., Weiser, M., TEXTNET: A network-based approach to text handling
QuoteRef: trisJB1_2008 ;;Tristan, J.-B., Leroy, X., Formal verification of translation validators. A case study on instruction scheduling optimizations
QuoteRef: trisJB1_2010 ;;Tristan, J.-B., Leroy, X., A simple, valid validator for software pipelining
QuoteRef: trumI10_2017 ;;Trummer, I., Koch, C., Multi-objective parametric query optimization [NewQuotes]
QuoteRef: tsafD10_2009 ;;Tsafrir, D. et al., Minimizing dependencies within generic classes for faster smaller programs
QuoteRef: tschMS10_2005 ;;Tschantz, M.S., Ernst, M.D., Javari: adding reference immutability to Java
QuoteRef: tsicD1_1983 ;;Tsichritzis, D., Christodoulakis, S., Message files
QuoteRef: turbTN6_1981 ;;Turba, T.N., Checking for spelling and typographical errors in computer-based text.
QuoteRef: tzimG6_2021 ;;Tzimpragos, G. et al., In-sensor classification with boosted race trees [NewQuotes]
QuoteRef: uenoK9_2011 ;;Ueno, K. et al., An efficient non-moving garbage collector for functional languages
QuoteRef: ungaD1_1992 ;;Ungar, D., Jackson, F., An adaptive tenuring policy for generation scavengers
QuoteRef: ungaD4_1997 ;;Ungar, D. et al., Debugging and the experience of immediacy
QuoteRef: ungarD5_1984 ;;Ungar, D., Generation scavenging: A non-disruptive high performance storage reclamation algorithm.
QuoteRef: unkeC1_2008 ;;Unkel, C., Lam, M.S., Automatic inference of stationary fields: a generalization of Java's final fields
QuoteRef: urbaJ7_2019 ;;Urbano, J. et al., Statistical significance testing in information retrieval: an empirical analysis of type I, type II, and type III errors [NewQuotes]
QuoteRef: urdaG1_2011 ;;Urdaneta, G. et al., A survey of DHT security techniques
QuoteRef: urecV10_2013 ;;Ureche, V. et al., Miniboxing: Improving the speed to code size tradeoff in parametric polymorphism translations
QuoteRef: uzelV7_2009 ;;Uzelac, V., Milenkovic, A., A real-time program trace compressor utilizing double move-to-front method
QuoteRef: vachP1_2021 ;;Vachon, P., The identity in everyone's pocket [NewQuotes]
QuoteRef: vafeV1_2015 ;;Vafeiadis, V. et al., Common compiler optimisations are invalid in the C11 memory model and what we can do about it
QuoteRef: valiLG8_1990 ;;Valiant, L.G., A bridging model for parallel computation
QuoteRef: vandB1_1996 ;;Vander Zanden, B., An incremental algorithm for satisfying hierarchies of multiway dataflow constraints [NewQuotes]
QuoteRef: vanhD9_2011 ;;Van Horn, D., Might, M., Abstracting abstract machines: A systematic approach to higher-order program analysis
QuoteRef: vansME_1980 ;;Vansuch, M.E. et al., Computer aided cinematography techniques for model validation
QuoteRef: vargG12_1997 ;;Varghese, G., Lauck, A., Hashed and hierarchical timing wheels: efficient data structures for implementing a timer facility
QuoteRef: vaswK1_2007 ;;Vaswani, K. et al., Preferential path profiling: compactly numbering interesting paths
QuoteRef: veinES5_1999 ;;Veinott, E.S. et al., Video helps remote work: Speakers who need to negotiate common ground benefit from seeing each other
QuoteRef: veneT3_1978 ;;Venema, T., des Rivieres, J., Euclid and Pascal
QuoteRef: venkV9_2005 ;;Venkatachalam, V., Franz, M., Power reduction techniques for microprocessor systems
QuoteRef: verbJ3_20 ;;Verbraeken, J. et al., A survey on distributed machine learning [NewQuotes]
QuoteRef: versD3_1997 ;;Verschaeren, D. et al., On the need for predictable floating-point arithmetic in the programming languages Fortran 90 and C/C++
QuoteRef: vessI1_1986 ;;Vessey, I., Weber, R., Structured tools and conditional logic: An empirical investigation
QuoteRef: vienN3_2013 ;;Viennot, N. et al., Transparent mutable replay for multicore debugging and patch validation
QuoteRef: vilkJ11_2020 ;;Vilk, J., Berger, E.D., Bleak*: automatically debugging memory leaks in web applications [NewQuotes]
QuoteRef: viotP6_2016 ;;Viotti, P., Vukolic, M., Consistency in non-transactional distributed storage systems [NewQuotes]
QuoteRef: virzRA4_1996 ;;Virzi, R.A. et al., Usability problem identification using both low- and high-fidelity prototypes
QuoteRef: vittJS6_2001 ;;Vitter, J.S., External memory algorithms and data structures: Dealing with massive data
QuoteRef: vixiP4_2015 ;;Vixie, P., Go static or go home
QuoteRef: vlecT7_1989 ;;van Vleck, T., Three questions about each bug you find
QuoteRef: vogeW1_2009 ;;Vogels, W., Eventually consistent
QuoteRef: vollM6_2019 ;;Vollmer, M. et al., LoCal: a language for programs operating on serialized data [NewQuotes]
QuoteRef: voorEA6_1958 ;;Voorhees, E.A., Algebraic formulation of flow diagrams
QuoteRef: vranD10_2014 ;;Vrandecic, D., Krotzsch, M., Wikidata: A free collaborative knowledgebase
QuoteRef: vrviN6_2017 ;;Vrvilo, N. et al., A marshalled data format for pointers in relocatable data blocks [NewQuotes]
QuoteRef: wadlP1_1989 ;;Wadler, P., Blott, S., How to make ad-hoc polymorphism less ad hoc
QuoteRef: wadlP12_2015 ;;Wadler, P., Propositions as types
QuoteRef: waghS2_2021 ;;Wagh, S. et al., DP-cryptography: marrying differential privacy and cryptography in emerging applications [NewQuotes]
QuoteRef: wahbR6_1993 ;;Wahbe, R. et al., Practical data breakpoints: design and implementation
QuoteRef: waitWM7_1967 ;;Waite, W.M., A language independent macro processor
QuoteRef: walcK7_2012 ;;Walcott-Justice, K. et al., THeME: a system for testing by hardware monitoring events [NewQuotes]
QuoteRef: waldJ7_1999 ;;Waldo, J., The Jini architecture for network-centric computing
QuoteRef: waldJ8_2008 ;;Waldo, J., Scaling in games and virtual worlds
QuoteRef: walkD7_2000 ;;Walker, D. et al., Typed memory management via static capabilities
QuoteRef: waltES5_1967 ;;Walter, E.S., Wallace, V.L., Further analysis of a computer center environment
QuoteRef: wangAA8_2006 ;;Wang, A.-I. A. et al., The Conquest file system: better performance through a disk/persistent-RAM hybrid design
QuoteRef: wangK3_2011 ;;Wang, K., Rao, J., Rethink the virtual machine template
QuoteRef: wangK4_2017 ;;Wang, K. et al., Graspan: a single-machine disk-based graph system for intraprocedural static analysis of large-scale systems code [NewQuotes]
QuoteRef: wangK3_2018 ;;Wang, K. et al., Hop, skip, &jump [NewQuotes]
QuoteRef: wangS3_2018 ;;Wang, S. et al., Understanding and auto-adjusting performance-sensitive configurations [NewQuotes]
QuoteRef: wangX11_2002 ;;Wang, X. et al., Achieving undo in bitmap-based collaborative graphics editing systems
QuoteRef: wangX3_2016 ;;Wang, X. et al., A differential approach to undefined behavior detection
QuoteRef: wangY1_2009 ;;Wang, Y. et al., The theory of deadlock avoidance via discrete control
QuoteRef: wangY6_2013 ;;Wang, Y. et al., Generating sound and effective memory debuggers
QuoteRef: warfJS6_2020 ;;Warford, J.S. et al., A calculational deductive system for linear temporal logic [NewQuotes]
QuoteRef: wassG6_2007 ;;Wassermann, G., Su, Z., Sound and precise analysis of web applications for injection vulnerabilities
QuoteRef: watsRW5_1987 ;;Watson, R.W., Mamrak, S.A., Gaining efficiency in transport services by appropriate design and implementation choices
QuoteRef: wattC1_2018 ;;Watt, C., Mechanising and verifying the WebAssembly specification [NewQuotes]
QuoteRef: wattJC_1996 ;;Watts, J.C. et al., Voice loops as cooperative aids in space shuttle mission control
QuoteRef: weavAC_1978 ;;Weaver, A.C., A real-time, multi-task programming language for microprocessor-based industrial process control
QuoteRef: webeM2_1980 ;;Weber, M., Bernstein, S.L., Global register allocation for non-equivalent register sets
QuoteRef: weerD3_2010 ;;Weeratunge, D. et al., Analyzing multicore dumps to facilitate concurrency bug reproduction
QuoteRef: weerD10_2011 ;;Weeratunge, D. et al., Accentuating the positive: atomicity inference and enforcement using correct executions
QuoteRef: wegbB5_1974 ;;Wegbreit, B., The treatment of data types in EL1
QuoteRef: wegiM3_2008 ;;Wegiel, M., Krintz, C., The mapping collector: virtual memory support for generational, parallel, and concurrent compaction
QuoteRef: wegnE11_1973 ;;Wegner, E., Tree-structured programs
QuoteRef: wegnP10_1986 ;;Wegner, P., Classification in object-oriented systems
QuoteRef: wegnP8_1990 ;;Wegner, P., Concepts and paradigms of object-oriented programming
QuoteRef: weidNH4_1975 ;;Weiderman, N.H., Rawson, B.M., Flowcharting loops without cycles
QuoteRef: weinGM8_1975 ;;Weinberg, G.M. et al., If-then-else considered harmful
QuoteRef: weisM7_1982 ;;Weiser, M., Programmers use slices when debugging
QuoteRef: welsM12_2001 ;;Welsh, M. et al., SEDA: An architecture for well-conditioned scalable internet services
QuoteRef: wenH2_2018 ;;Wen, H., Interval-based memory reclamation [NewQuotes]
QuoteRef: wertH_1981 ;;Wertz, H., Some ideas on the educational use of computers
QuoteRef: wexeA4_1992 ;;Wexelblat, A., Groups without groupware
QuoteRef: wexeR3_1989 ;;Wexelblat, R., Editor's notes
QuoteRef: weyuEJ6_1988 ;;Weyuker, E.J., The evaluation of program-based software test data adequacy criteria
QuoteRef: whalJ6_2004 ;;Whaley, J., Lam, M.S., Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
QuoteRef: whalT5_1989 ;;Whalen, T., Patrick, A., Conversational hypertext: Information access through natural language dialogues with computers
QuoteRef: whitJ6_1982 ;;Whiteside, J. et al., How do people really use text editors?
QuoteRef: whitJ5_1989 ;;Whiteside, J. (Panel member), The role of laboratory experiments in HCI: Help, hindrance, or ho-hum? (Panel)
QuoteRef: whitS5_1995 ;;Whittaker, S., Schwarz, H., Back to the future: Pen and paper technology supports complex group coordination
QuoteRef: whitS11_1998 ;;Whittaker, S. et al., The dynamics of mass interaction
QuoteRef: whitS6_2001 ;;Whittaker, S., Hirschberg, J., The character, value, and management of personal paper archives
QuoteRef: wickSB7_2011 ;;Wicker, S.B., Cellular telephony and the question of privacy
QuoteRef: wickSB10_2017 ;;Wicker, S.B., Karlsson, K., Internet advertising: technology, ethics, and a serious difference of opinion [NewQuotes]
QuoteRef: wickSB5_2020 ;;Wicker, S.B., Ghosh, D., Reading in the panopticon -- Your Kindle may be spying on you, but you can't be sure [NewQuotes]
QuoteRef: wiecCA3_1982 ;;Wiecek, C.A., A case study of VAX-ll instruction set usage for compiler execution
QuoteRef: wilcJR2_2018 ;;Wilcox, J.R. et al., VerifiedFT: a verified, high-performance precise dynamic race detector [NewQuotes]
QuoteRef: wilhR2_2014 ;;Wilhelm, R., Grund, D., Computation takes time, but how much?
QuoteRef: wilkK6_2000 ;;Wilken, K. et al., Optimal instruction scheduling using integer programming
QuoteRef: wilkM10_1990 ;;Wilkes, M., It's all software, now
QuoteRef: wilkMV8_1986 ;;Wilkes, M.V., EMPIRIC A sketch of a programming language designed to facilitate a fine grain of protection
QuoteRef: wilkVW8_1992 ;;Wilkes, V.W., Artificial intelligence as the year 2000 approaches
QuoteRef: willD10_2008 ;;Willis, D. et al., Caching and incrementalisation in the Java Query Language
QuoteRef: willD3_2011 ;;Williams, D. et al., Overdriver: handling memory overload in an oversubscribed cloud
QuoteRef: willHE10_2004 ;;Williams, H.E. et al., Fast phrase querying with combined indexes
QuoteRef: willS4_2009 ;;Williams, S. et al., Roofline: An insightful visual performance model for multicore architectures
QuoteRef: willTR4_1992 ;;Williams, T.R., Farkas, D.K., Minimalism reconsidered: Should we design documentation for exploratory learning?
QuoteRef: wilsS3_2008 ;;Wilson, S., Public key superstructure "It's PKI Jim, but not as we know it!"
QuoteRef: wingJM10_2021 ;;Wing, J.M., Trustworthy AI [NewQuotes]
QuoteRef: winkJF8_1992 ;;Winkler, J.F.H., Objectivism: "class" considered harmful, letter to the editor
QuoteRef: winnRI10_1984 ;;Winner, R.I., Unassigned objects
QuoteRef: winoT7_1979 ;;Winograd, T., Beyond programming languages
QuoteRef: wintJ7_2011 ;;Winther, J., Guarded type promotion [NewQuotes]
QuoteRef: wintP8_1997 ;;Winterbottom, P., Pike, R., The design of the Inferno virtual machine
QuoteRef: wirtN1_1966 ;;Wirth, N., Weber, H., EULER: A generalization of ALGOL, and its formal definition: Part I
QuoteRef: wirtN6_1966 ;;Wirth, N., Hoare, C.A.R., A contribution to the development of ALGOL
QuoteRef: wirtN4_1971 ;;Wirth, N., Program development by stepwise refinement
QuoteRef: wirtN8_1977 ;;Wirth, N., Toward a discipline of real-time programming
QuoteRef: wirtN4_1988 ;;Wirth, N., Type extensions
QuoteRef: wittIH6_1987 ;;Witten, I.H. et al., Arithmetic coding for data compression
QuoteRef: wobbE2_1994 ;;Wobber, E. et al., Authentication in the Taos operating system
QuoteRef: wongL9_1995 ;;Wong, L., An introduction to Remy's fast polymophic record projection
QuoteRef: wongL9_2000 ;;Wong, L, The functional guts of the Kleisli query system
QuoteRef: woodSR6_1981 ;;Wood, S.R., Z-The 95% program editor
QuoteRef: wordA3_1997 ;;Worden, a. et al., Making computers easier for older adults to use: Area cursors and sticky icons
QuoteRef: wuC5_2008 ;;Wu, C., Liu, Y., Queuing network modeling of transcription typing
QuoteRef: wuPC6_1997 ;;Wu, P.-C., Multiplicative, congruential random-number generators with multiplier +- 2^k1 +- 2^k2 and modulus 2^p - 1
QuoteRef: wulfWA10_1971 ;;Wulf, W.A. et al., Reflections on a systems programming language
QuoteRef: wulfWA12_1971 ;;Wulf, W.A. et al., Bliss: a language for systems programming
QuoteRef: wyboN4_1990 ;;Wybolt, A., Experiences with C++ and object-oriented software development
QuoteRef: xiQ6_2010 ;;Xi, Q., Walker, D., A context-free markup language for semi-structured text
QuoteRef: xiaoT5_2014 ;;Xiao, T. et al., Nondeterminism in MapReduce considered harmful? An empirical study on non-commutative aggregators in MapReduce programs
QuoteRef: xiaoX6_2014 ;;Xiao, X. et al., Persistent pointer information
QuoteRef: xieC10_2015 ;;Xie, C. et al., High-performance ACID via modular concurrency control [NewQuotes]
QuoteRef: xionH6_2019 ;;Xiong, H. et al., A survey of group key agreement protocols with constant rounds [NewQuotes]
QuoteRef: xuG6_2009 ;;Xu, G. et al., Go with the flow: profiling copies to find runtime bloat
QuoteRef: xuG6_2010 ;;Xu, G. et al., Finding low-utility data structures
QuoteRef: xuG10_2013 ;;Xu, G., Resurrector: A tunable object lifetime profiling technique for optimizing real-world programs
QuoteRef: xuH9_2021 ;;Xu, H. et al., Memory-safety challenge considered solved? An in-depth study of all Rust CVEs [NewQuotes]
QuoteRef: xuJ12_1991 ;;Xu, J., Parnas, D.L., On satisfying timing constraints in hard-real-time systems
QuoteRef: xuT7_2015 ;;Xu, T., Zhou, Y., Systems approaches to tackling configuration errors: a survey
QuoteRef: xuZ6_2000 ;;Xu, Z. et al., Safety checking of machine code
QuoteRef: xuanJ1_2019 ;;Xuan, J. et al., A survey of Bayesian nonparametric learning [NewQuotes]
QuoteRef: yangC3_2016 ;;Yang, C., Mellor-Crummey, J., A wait-free queue as fast as fetch-and-add
QuoteRef: yangC8_2016 ;;Yang, C. et al., Hierarchical program paths [NewQuotes]
QuoteRef: yangJ12_2011 ;;Yang, J., Hawblitzel, C., Safe to the last instruction: Automated verification of a type-safe operating system
QuoteRef: yangK9_2017 ;;Yang, K. et al., Exploiting the analog properties of digital circuits for malicious hardware [NewQuotes]
QuoteRef: yangX6_2009 ;;Yang, X. et al., Eliminating the call stack to save RAM
QuoteRef: yangX6_2011 ;;Yang, X. et al., Finding and understanding bugs in C compilers
QuoteRef: yankN11_2004 ;;Yankelovich, N. et al., Meeting central: making distributed meetings more effective
QuoteRef: yeeB1_2010 ;;Yee, B., et al, Native client: A sandbox for portable, untrusted x86 native code
QuoteRef: yiJ2_2011 ;;Yi, J. et al., Cooperative reasoning for preemptive execution
QuoteRef: yoonMK4_2016 ;;Yoon, M.-K. et al., PIFT: predictive information-flow tracking
QuoteRef: yoonY5_2015 ;;Yoon, Y., Myers, B.A., Supporting selective undo in a code editor [NewQuotes]
QuoteRef: younAL7_2017 ;;Young, A.L., Yung, M., Cryptovirology: the birth, neglect, and explosion of ransomware [NewQuotes]
QuoteRef: younY6_2012 ;;Younan, Y. et al., Runtime countermeasures for code injection attacks against C and C++ programs
QuoteRef: yuJ10_2012 ;;Yu, J. et al., Maple: A coverage-driven testing tool for multithreaded programs
QuoteRef: yuJ12_2021 ;;Yu, J. et al., Speculative taint tracking (STT): A comprehensive protection for speculatively accessed data [NewQuotes]
QuoteRef: yuanD3_2010 ;;Yuan, D. et al., SherLog: error diagnosis by connecting clues from run-time logs
QuoteRef: yuanD2_2012 ;;Yuan, D. et al., Improving software diagnosability via log enhancement
QuoteRef: yueS10_2021 ;;Yue, S., Katabi, D., Liquid testing with your smartphone [NewQuotes]
QuoteRef: zahaM11_2016 ;;Zaharia, M. et al., Apache Spark: a unified engine for big data processing
QuoteRef: zaniC3_1982 ;;Zaniolo, C., Database relations with null values [NewQuotes]
QuoteRef: zappF11_2018 ;;Zappa Nardelli, F. et al., Julia subtyping: a rational reconstruction [NewQuotes]
QuoteRef: zaveP4_2012 ;;Zave, P., Using lightweight modeling to understand Chord
QuoteRef: zdonSB10_1986 ;;Zdonik, S.B., Maintaining consistency in a database with changing types
QuoteRef: zdonSB11_1986 ;;Zdonik, S.B., Why properties are objects or some refinements of "is-a"
QuoteRef: zeldN11_2011 ;;Zeldovich, N. et al., Making information flow explicit in HiStar
QuoteRef: zelkMV9_1973 ;;Zelkowitz, M.V., Reversible execution
QuoteRef: zemaH3_1966 ;;Zemanek, H., Semiotics and programming languages
QuoteRef: zendO10_1997 ;;Zendra, O. et al., Efficient dynamic dispatch without virtual function tables. The SmallEiffel compiler
QuoteRef: zengQ6_2011 ;;Zeng, Q. et al., Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures
QuoteRef: zezuP10_1991 ;;Zezula, P. et al., Dynamic partitioning of signature files
QuoteRef: zhaiS9_2012 ;;Zhai, S., Kristensson, P.O., The word-gesture keyboard: Reimagining keyboard interaction
QuoteRef: zhanC3_2021 ;;Zhang, C. et al., Understanding deep learning (still) requires rethinking generalizations [NewQuotes]
QuoteRef: zhanI10_2015 ;;Zhang, I. et al., Building consistent transactions with inconsistent replication [NewQuotes]
QuoteRef: zhanL3_2018 ;;Zhang, L. et al., Analysis of SSL certificate reissues and revocations in the wake of Heartbleed [NewQuotes]
QuoteRef: zhanQ10_2014 ;;Zhang, Q. et al., Efficient subcubic alias analysis for C
QuoteRef: zhanQ6_2017 ;;Zhang, Q. et al., Skeletal program enumeration for rigorous compiler testing [NewQuotes]
QuoteRef: zhanT4_2017 ;;Zhang, T. et al., ProRace: practical data race detection for production use [NewQuotes]
QuoteRef: zhanW3_2011 ;;Zhang, W. et al., ConSeq: Detecting concurrency bugs through sequential errors
QuoteRef: zhanW3_2013 ;;Zhang, W. et al., ConMem: Detecting crash-triggering concurrency bugs through an effect-oriented approach
QuoteRef: zhanX9_2005 ;;Zhang, X., Gupta, R., Whole execution traces and their applications
QuoteRef: zhanX5_2006 ;;Zhang, X. et al., Locating faults through automated predicate switching
QuoteRef: zhanY1_2010 ;;Zhang, Y. et al., Fast tridiagonal solvers on the GPU
QuoteRef: zhanY6_2015 ;;Zhang, Y. et al., Lightweight, flexible object-oriented generics
QuoteRef: zhaoH10_2012 ;;Zhao, H., et. al., The HipHop compiler for PHP
QuoteRef: zhaoM9_2018 ;;Zhao, M. et al., Emotion recognition using wireless signals [NewQuotes]
QuoteRef: zhaoQ6_2010 ;;Zhao, Q. et al., Efficient memory shadowing for 64-bit architectures
QuoteRef: zhenX1_2008 ;;Zheng, X., Rugina, R., Demand-driven alias analysis for C
QuoteRef: zhonY8_2009 ;;Zhong, Y. et al., Program locality analysis using reuse distance
QuoteRef: zhuYK9_2010 ;;Zhu, Y.-K., Hayes, W.B., Algorithm 908: online exact summation of floating-point streams
QuoteRef: zhurS11_2012 ;;Zhuravlev, S. et al., Survey of scheduling techniques for addressing shared resources in multicore processors
QuoteRef: zibiY10_2001 ;;Zibin, Y., Gil, J.(Y.), Efficient subtyping tests with PQ-encoding
QuoteRef: zibiY11_2002 ;;Zibin, Y., Gil, J.(Y.), Fast algorithm of creating space efficient dispatching tables with application to multi-dispatching
QuoteRef: ziegEW4_1974 ;;Ziegler, E.W., An introduction to the UMTA specification language
QuoteRef: zimmJA2_1981 ;;Zimmer, j.a., A control form for complex iterations
QuoteRef: zobeJ7_2006 ;;Zobel, J., Moffat, A., Inverted files for text search engines
QuoteRef: zohaA9_2015 ;;Zohar, A., Bitcoin: under the hood
QuoteRef: zongQ2_2002 ;;Zongyan, Q., Bit-vector encoding of n-queen problem
QuoteRef: zuY2_2012 ;;Zu, Y. et al., GPU-based NFA implementation for memory efficient high speed regular expression matching

Related up

Topic: ACM references
ThesaHelp: ACM references a-e
ThesaHelp: ACM references f-l
ThesaHelp: ACM references m-z

Updated barberCB 4/23
Copyright © 2002-2023 by C.B. Barber
Thesa, Avev, and thid-... are trademarks of C.B. Barber