Search alternatives:
application using » applications using, application design
runtime computer » hunting computer, customs computer, future computer
using runtime » during runtime, using time, using regime
1
by Sato, Mitsuhisa.
Published 2020
Format:
Table of Contents: ...-View Programming Model -- 3.1 Communications Using Coarray -- 3.2 Performance on the K Computer -- 4...
Click to View
2
by Sergey, Ilya.
Published 2022
Format:
Table of Contents: ... and concurrency -- 5.3 Soundness and program extraction -- 6 Application -- 7 Implementation -- 8 Conclusion -- 8...
Click to View
3
by Reinders, James.
Published 2020
Format:
Table of Contents: ... Computation Using Small Data Types -- Optimizing Math Functions -- Specialized Functions and Extensions...
Click to View
4
by Cohen, Ryan.
Published 2014
Format:
Table of Contents: ... Infotainment -- Other Application Platforms and Fields -- Cloud Computing -- Robotics -- Wireless Sensor...
Click to View
5
by Johnsen, Einar Broch.
Published 2022
Format:
Table of Contents: ... Program Sketching using Lifted Static Analysis -- 1 Introduction -- 2 Motivating Examples -- 3...
Click to View
6
by Lambers, Leen.
Published 2023
Format:
Table of Contents: ... Foundation of Program Comprehension (Abstract of an Invited Talk) -- Contents -- Regular Contributions -- ACo...
Click to View
7
by Groote, Jan Friso.
Published 2021
Format:
Table of Contents: ....0 for Verifying Multiplier Circuits -- 1 Introduction -- 2 Circuit Verification using Computer Algebra -- 3 Usage...
Click to View
8
by Galis, Alex.
Published 2013
Format:
Table of Contents: ... -- Computing and Networking Clouds -- Contrail: Distributed Application Deployment under SLA in Federated...
Click to View
9
by Fisman, Dana.
Published 2022
Format:
Table of Contents: ... to Extreme Fairness -- 5 Extremely Fair Adversarial Rabin Games -- 5.1 Preliminaries on Symbolic Computations...
Click to View
10
by Domingue, John.
Published 2011
Format:
Table of Contents: ... Architecture and Design -- Security Support in Programming Environments -- Secure Service Composition -- Secure...
Click to View
11
by Krajci, Iggy.
Published 2013
Format:
Table of Contents: ... -- Application Debugging Using the Android Debug Bridge -- Setting Up ADB -- ADB on Windows -- ADB Host-Client...
Click to View
12
by Pernici, Barbara.
Published 2019
Format:
Table of Contents: ...7 Dynamic Application Autotuning for Self-aware Approximate Computing -- 7.1 Introduction -- 7...
Click to View
13
by Gruhn, Volker.
Published 2018
Format:
Table of Contents: ... for Deviceless Edge Computing -- 4.1 Programming Support for Deviceless Edge Functions -- 4.2 Intents and Intent...
Click to View
14
by Reussner, Ralf.
Published 2019
Format:
Table of Contents: ... Pattern Catalogue -- 6.3.2 Decision-Making Process Using a Pattern Catalogue -- 6.3.3 Application...
Click to View
15
by Felderer, Michael.
Published 2020
Format:
Table of Contents: ....2 Design View -- 2.3 Program View -- 3 Software Development -- 4 Teamwork -- 5 A Final Wish -- Applications...
Click to View
16
by Cheruvu, Sunil.
Published 2019
Format:
Table of Contents: ... -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law...
Click to View