咨询与建议

限定检索结果

文献类型

  • 1,121 篇 会议
  • 137 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,085 篇 工学
    • 1,014 篇 软件工程
    • 779 篇 计算机科学与技术...
    • 44 篇 控制科学与工程
    • 42 篇 电气工程
    • 40 篇 信息与通信工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 化学工程与技术
    • 4 篇 航空宇航科学与技...
    • 3 篇 生物工程
    • 2 篇 光学工程
    • 2 篇 农业工程
  • 132 篇 理学
    • 112 篇 数学
    • 13 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 物理学
    • 4 篇 化学
  • 88 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 13 篇 教育学
    • 13 篇 教育学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 2 篇 农学
    • 2 篇 作物学

主题

  • 185 篇 design
  • 173 篇 languages
  • 102 篇 performance
  • 96 篇 computer program...
  • 62 篇 algorithms
  • 50 篇 computer program...
  • 47 篇 object oriented ...
  • 46 篇 experimentation
  • 43 篇 java programming...
  • 40 篇 verification
  • 35 篇 reliability
  • 32 篇 functional progr...
  • 31 篇 java
  • 26 篇 program synthesi...
  • 24 篇 probabilistic pr...
  • 21 篇 domain-specific ...
  • 20 篇 c (programming l...
  • 20 篇 measurement
  • 20 篇 concurrency
  • 19 篇 theory

机构

  • 16 篇 carnegie mellon ...
  • 13 篇 princeton univ p...
  • 11 篇 univ washington ...
  • 11 篇 univ texas austi...
  • 10 篇 univ michigan an...
  • 10 篇 univ penn philad...
  • 10 篇 rice univ housto...
  • 10 篇 purdue univ w la...
  • 10 篇 stanford univ st...
  • 10 篇 univ calif berke...
  • 9 篇 univ wisconsin m...
  • 9 篇 yale univ new ha...
  • 9 篇 harvard univ cam...
  • 9 篇 cornell univ ith...
  • 8 篇 microsoft res re...
  • 8 篇 mit cambridge ma...
  • 8 篇 univ chicago il ...
  • 7 篇 microsoft res re...
  • 7 篇 swiss fed inst t...
  • 7 篇 northeastern uni...

作者

  • 11 篇 walker david
  • 10 篇 dillig isil
  • 9 篇 chlipala adam
  • 8 篇 shao zhong
  • 8 篇 solar-lezama arm...
  • 8 篇 chaudhuri swarat
  • 8 篇 gulwani sumit
  • 7 篇 august david i.
  • 7 篇 bacon david f.
  • 7 篇 sarkar vivek
  • 6 篇 wang xinyu
  • 6 篇 hendren laurie
  • 6 篇 grossman dan
  • 6 篇 adl-tabatabai al...
  • 6 篇 aiken alex
  • 6 篇 foster nate
  • 6 篇 felleisen matthi...
  • 6 篇 myers andrew c.
  • 6 篇 mezini mira
  • 6 篇 mahlke scott

语言

  • 1,173 篇 英文
  • 85 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation"
1259 条 记 录,以下是221-230 订阅
排序:
Occurrence Typing Modulo Theories
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 296-309页
作者: Kent, Andrew M. Kempe, David Tobin-Hochstadt, Sam Indiana Univ Bloomington IN 47405 USA
We present a new type system combining occurrence typing- a technique previously used to type check programs in dynamically-typed languages such as Racket, Clojure, and JavaScript-with dependent refinement types. We d... 详细信息
来源: 评论
Latte: A language, Compiler, and Runtime for Elegant and Efficient Deep Neural Networks
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 209-223页
作者: Truong, Leonard Barik, Rajkishore Totoni, Ehsan Liu, Hai Markley, Chick Fox, Armando Shpeisman, Tatiana Univ Calif Berkeley Intel Labs Berkeley CA USA Intel Labs Berkeley CA USA Univ Calif Berkeley Berkeley CA USA
Deep neural networks (DNNs) have undergone a surge in popularity with consistent advances in the state of the art for tasks including image recognition, natural language processing, and speech recognition. The computa... 详细信息
来源: 评论
A design and Verification Methodology for Secure Isolated Regions
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 665-681页
作者: Sinha, Rohit Costa, Manuel Lal, Akash Lopes, Nuno P. Rajamani, Sriram Seshia, Sanjit A. Vaswani, Kapil Univ Calif Berkeley Berkeley CA 94720 USA Microsoft Res London England Microsoft Res Bengaluru Karnataka India
Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running on a hostile or compromised host. However, automatically ve... 详细信息
来源: 评论
End-to-End Verification of Information-Flow Security for C and Assembly Programs
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 648-664页
作者: Costanzo, David Shao, Zhong Gu, Ronghui Yale Univ New Haven CT 06520 USA
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward conquering this challenge is ... 详细信息
来源: 评论
Profile- Guided Meta-programming  15
Profile- Guided Meta-Programming
收藏 引用
36th acm sigplan conference on programming language design and implementation
作者: Bowman, William J. Miller, Swaha St-Amour, Vincent Dybvig, R. Kent Northeastern Univ Boston MA 02115 USA Cisco Syst Inc San Jose CA USA
Contemporary compiler systems such as GCC,. NET, and LLVM incorporate profile-guided optimizations (PGOs) on low-level intermediate code and basic blocks, with impressive results over purely static heuristics. Recent ... 详细信息
来源: 评论
acm International conference Proceeding Series
ACM International Conference Proceeding Series
收藏 引用
8th Workshop on Network Simulator (ns-3), WNS3 2016
The proceedings contain 18 papers. The topics discussed include: design and implementation of the traffic control module in ns-3;implementation and evaluation of proportional integral controller enhanced (PIE) algorit...
来源: 评论
Type-and-Example-Directed Program Synthesis  15
Type-and-Example-Directed Program Synthesis
收藏 引用
36th acm sigplan conference on programming language design and implementation
作者: Osera, Peter-Michael Zdancewic, Steve Univ Penn Philadelphia PA 19104 USA
This paper presents an algorithm for synthesizing recursive functions that process algebraic datatypes. It is founded on proof-theoretic techniques that exploit both type information and input-output examples to prune... 详细信息
来源: 评论
Relaxing Safely: Verified On-the-Fly Garbage Collection for x86-TSO  15
Relaxing Safely: Verified On-the-Fly Garbage Collection for ...
收藏 引用
36th acm sigplan conference on programming language design and implementation
作者: Gammie, Peter Hosking, Antony L. Engelhardt, Kai Purdue Univ W Lafayette IN 47907 USA UNSW Sydney NSW Australia
We report on a machine-checked verification of safety for a state-of-the-art, on-the-fly, concurrent, mark-sweep garbage collector that is designed for multi-core architectures with weak memory consistency. The proof ... 详细信息
来源: 评论
Asynchronous programming, analysis and testing with state machines  15
Asynchronous programming, analysis and testing with state ma...
收藏 引用
proceedings of the 36th acm sigplan conference on programming language design and implementation
作者: Deligiannis, Pantazis Donaldson, Alastair F. Ketema, Jeroen Lal, Akash Thomson, Paul Imperial College London United Kingdom Microsoft Research India
programming efficient asynchronous systems is challenging because it can often be hard to express the design declaratively, or to defend against data races and interleaving-dependent assertion violations. Previous wor... 详细信息
来源: 评论
Input Responsiveness: Using Canary Inputs to Dynamically Steer Approximation
收藏 引用
acm sigplan NOTICES 2016年 第6期51卷 161-176页
作者: Laurenzano, Michael A. Hill, Parker Samadi, Mehrzad Mahlke, Scott Mars, Jason Tang, Lingjia Univ Michigan Dept Elect Engn & Comp Sci Ann Arbor MI 48109 USA
This paper introduces Input Responsive Approximation ( IRA), an approach that uses a canary input - a small program input carefully constructed to capture the intrinsic properties of the original input - to automatica... 详细信息
来源: 评论