咨询与建议

限定检索结果

文献类型

  • 1,120 篇 会议
  • 137 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,082 篇 工学
    • 1,011 篇 软件工程
    • 776 篇 计算机科学与技术...
    • 43 篇 控制科学与工程
    • 42 篇 电气工程
    • 40 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 5 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 航空宇航科学与技...
    • 3 篇 生物工程
    • 2 篇 光学工程
    • 2 篇 农业工程
  • 132 篇 理学
    • 112 篇 数学
    • 13 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 5 篇 生物学
    • 4 篇 物理学
    • 4 篇 化学
  • 88 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 13 篇 教育学
    • 13 篇 教育学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 2 篇 农学
    • 2 篇 作物学

主题

  • 185 篇 design
  • 173 篇 languages
  • 102 篇 performance
  • 96 篇 computer program...
  • 62 篇 algorithms
  • 50 篇 computer program...
  • 47 篇 object oriented ...
  • 46 篇 experimentation
  • 43 篇 java programming...
  • 40 篇 verification
  • 35 篇 reliability
  • 32 篇 functional progr...
  • 31 篇 java
  • 26 篇 program synthesi...
  • 24 篇 probabilistic pr...
  • 21 篇 domain-specific ...
  • 20 篇 measurement
  • 20 篇 concurrency
  • 19 篇 theory
  • 19 篇 c (programming l...

机构

  • 16 篇 carnegie mellon ...
  • 13 篇 princeton univ p...
  • 11 篇 univ washington ...
  • 11 篇 univ texas austi...
  • 10 篇 univ michigan an...
  • 10 篇 univ penn philad...
  • 10 篇 rice univ housto...
  • 10 篇 purdue univ w la...
  • 10 篇 stanford univ st...
  • 10 篇 univ calif berke...
  • 9 篇 univ wisconsin m...
  • 9 篇 yale univ new ha...
  • 9 篇 harvard univ cam...
  • 9 篇 cornell univ ith...
  • 8 篇 microsoft res re...
  • 8 篇 mit cambridge ma...
  • 8 篇 univ chicago il ...
  • 7 篇 microsoft res re...
  • 7 篇 swiss fed inst t...
  • 7 篇 northeastern uni...

作者

  • 11 篇 walker david
  • 10 篇 dillig isil
  • 9 篇 chlipala adam
  • 8 篇 shao zhong
  • 8 篇 solar-lezama arm...
  • 8 篇 chaudhuri swarat
  • 8 篇 gulwani sumit
  • 7 篇 august david i.
  • 7 篇 bacon david f.
  • 7 篇 sarkar vivek
  • 6 篇 wang xinyu
  • 6 篇 hendren laurie
  • 6 篇 grossman dan
  • 6 篇 adl-tabatabai al...
  • 6 篇 aiken alex
  • 6 篇 foster nate
  • 6 篇 felleisen matthi...
  • 6 篇 myers andrew c.
  • 6 篇 mezini mira
  • 6 篇 mahlke scott

语言

  • 1,176 篇 英文
  • 81 篇 其他
  • 1 篇 中文
检索条件"任意字段=Proceedings of the ACM SIGPLAN 2002 conference on Programming language design and implementation"
1258 条 记 录,以下是901-910 订阅
排序:
Methodology for hardware/software co-verification in C/C++  00
Methodology for hardware/software co-verification in C/C++
收藏 引用
2000 Asia and South Pacific design Automation conference, ASP-DAC 2000
作者: Séméria, Luc Ghosh, Abhijit Computer System Lab. Stanford University United States Synopsys Inc. Mountain View CA United States
In this paper we present our C/C++-based design environment for hardware/software co-verification. Our approach is to use C/C++ to describe both hardware and software throughout the design flow. Our methodology suppor... 详细信息
来源: 评论
A single intermediate language that supports multiple implementations of exceptions  00
A single intermediate language that supports multiple implem...
收藏 引用
proceedings of the acm sigplan 2000 conference on programming language design and implementation
作者: Norman Ramsey Simon Peyton Jones Harvard University Microsoft Research Ltd
We present mechanisms that enable our compiler-target language, C--, to express four of the best known techniques for implementing exceptions, all within a single, uniform framework. We define the mechanisms precisely...
来源: 评论
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation  00
Modular interprocedural pointer analysis using access paths:...
收藏 引用
proceedings of the acm sigplan 2000 conference on programming language design and implementation
作者: Ben-Chung Cheng Wen-Mei W. Hwu Department of Computer Science University of Illinois Department of Electrical and Computer Engineering University of Illinois
In this paper we present a modular interprocedural pointer analysis algorithm based on access-paths for C programs. We argue that access paths can reduce the overhead of representing context-sensitive transfer functio...
来源: 评论
Devil: An IDL for hardware programming  4
Devil: An IDL for hardware programming
收藏 引用
4th conference on Symposium on Operating System design and implementation, OSDI 2000
作者: Mérillon, Fabrice Réveillére, Laurent Consel, Charles Marlet, Renaud Muller, Gilles Compose Group IRISA INRIA University of Rennes I Campus Universitaire de Beaulieu Rennes CedexF-35042 France LaBRI ENSERB 351 cours de la Libération Talence CedexF-33405 France Trusted Logic 5 rue du Bailliage VersaillesF-78000 France
To keep up with the frantic pace at which devices come out, drivers need to be quickly developed, debugged and tested. Although a driver is a critical system component, the driver development process has made little (... 详细信息
来源: 评论
A generational on-the-fly garbage collector for Java  00
A generational on-the-fly garbage collector for Java
收藏 引用
proceedings of the acm sigplan 2000 conference on programming language design and implementation
作者: Tamar Domani Elliot K. Kolodner Erez Petrank IBM Haifa Research Lab. Computer Science Dept. Technion - Israel Institute of Technology
An on-the-fly garbage collector does not stop the program threads to perform the collection. Instead, the collector executes in a separate thread (or process) in parallel to the program. On-the-fly collectors are usef... 详细信息
来源: 评论
Improving design and source code modularity using AspectJ (tutorial session)  00
Improving design and source code modularity using AspectJ (t...
收藏 引用
proceedings of the 22nd international conference on Software engineering
作者: Cristina Videira Lopes Gregor Kiczales Computer Science Laboratory Xerox Palo Alto Research Center 3333 Coyote Hill Rd. Palo Alto CA Department of Computer Science University of British Columbia 201-2366 Main Mall Vancouver BC V6T 1Z4 Canada
Using only traditional techniques the implementation of concerns like exception handling, multi-object protocols, synchronization constraints, and security policies tends to be spread out in the code. The lack of modu...
来源: 评论
Once upon a polymorphic type
Conference Record of the Annual ACM Symposium on Principles ...
收藏 引用
conference Record of the Annual acm Symposium on Principles of programming languages 1999年 15-28页
作者: Wansbrough, Keith Jones, Simon Peyton Univ of Cambridge Cambridge United Kingdom
We present a sound type-based `usage analysis' for a realistic lazy functional language. Accurate information on the usage of program subexpressions in a lazy functional language permits a compiler to perform a nu... 详细信息
来源: 评论
Dependent types in practical programming
Conference Record of the Annual ACM Symposium on Principles ...
收藏 引用
conference Record of the Annual acm Symposium on Principles of programming languages 1999年 214-227页
作者: Xi, Hongwei Pfenning, Frank Oregon Graduate Inst of Science and Technology Beaverton OR United States
We present an approach to enriching the type system of ML with a restricted form of dependent types, where type index objects are drawn from a constraint domain C, leading to the DML(C) language schema. This allows sp... 详细信息
来源: 评论
proceedings of the 1998 Annual acm sigplan conference on programming language design and implementation, PLDI
Proceedings of the 1998 Annual ACM SIGPLAN Conference on Pro...
收藏 引用
proceedings of the 1998 Annual acm sigplan conference on programming language design and implementation, PLDI
The proceedings contains 31 papers from the 1998 acm sigplan 1998 conference on programming language design and implementation (PLDI). Topics discussed include: scalar register promotions;sparse partial redundancy eli... 详细信息
来源: 评论
Hancock: A language for processing very large-scale data  99
Hancock: A language for processing very large-scale data
收藏 引用
2nd conference on Domain-Specific languages (DSL 99)
作者: Bonachea, D Fisher, K Rogers, A Smith, F AT&T Labs Res Shannon Lab Florham Park NJ 07932 USA
A signature is an evolving customer profile computed from call records. AT&T uses signatures to detect fraud and to target marketing. Code to compute signatures can be difficult to write and maintain because of th... 详细信息
来源: 评论