咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 31 册 图书
  • 24 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 47 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 28 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 3 篇 机械工程
    • 2 篇 建筑学
    • 1 篇 仪器科学与技术
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 2 篇 地球物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 物理学
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 教育学
    • 5 篇 教育学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 103 篇 program executio...
  • 30 篇 program
  • 16 篇 data
  • 14 篇 command
  • 12 篇 manual
  • 11 篇 print
  • 11 篇 basic
  • 9 篇 file
  • 9 篇 breakpoint
  • 9 篇 display
  • 8 篇 statement
  • 8 篇 legal executions
  • 7 篇 address
  • 7 篇 debugging
  • 7 篇 execution
  • 6 篇 string
  • 6 篇 memory
  • 6 篇 location
  • 5 篇 reference manual
  • 5 篇 commands

机构

  • 2 篇 penn state univ ...
  • 2 篇 naval postgradua...
  • 2 篇 moscow mv lomono...
  • 1 篇 macronix int co ...
  • 1 篇 washington univ ...
  • 1 篇 saarland univ sa...
  • 1 篇 mitchell energy ...
  • 1 篇 acad sinica inst...
  • 1 篇 univ grenoble al...
  • 1 篇 uppsala univ dep...
  • 1 篇 p-core architect...
  • 1 篇 natl taiwan univ...
  • 1 篇 hewlett packard ...
  • 1 篇 georgia inst tec...
  • 1 篇 univ udine udine
  • 1 篇 dep. comp. sci. ...
  • 1 篇 center for secur...
  • 1 篇 university of ce...
  • 1 篇 hebei univ cyber...
  • 1 篇 department of ee...

作者

  • 3 篇 wang meng
  • 2 篇 tian cong
  • 2 篇 grigoriadou mari...
  • 2 篇 kyriakou christi...
  • 2 篇 duan zhenhua
  • 2 篇 gogoulou agorits...
  • 1 篇 kassab mohamad
  • 1 篇 fellman rd
  • 1 篇 david bainbridge
  • 1 篇 liu shaoshan
  • 1 篇 mueller peter
  • 1 篇 brzozowski marci...
  • 1 篇 infante alejandr...
  • 1 篇 izu cruz
  • 1 篇 ronald c. arkin
  • 1 篇 black m
  • 1 篇 budny john a.
  • 1 篇 chang hung-sheng
  • 1 篇 kevin leach
  • 1 篇 langendoerfer pe...

语言

  • 100 篇 英文
  • 3 篇 其他
检索条件"主题词=Program execution"
103 条 记 录,以下是91-100 订阅
排序:
Dec :: Pdp10 :: Tops10 Softwarenotebooks :: Vol13 :: Aa-Bh82B-Tb Ddt Manual Apr86
收藏 引用
2016年
Dec :: Pdp10 :: Tops10 Softwarenotebooks :: Vol13 :: Aa-Bh82B-Tb Ddt Manual Apr86 by published by
来源: 评论
Sds :: 9Xx :: 940 :: 901113A 940 Ddt Refman May67
收藏 引用
2016年
Sds :: 9Xx :: 940 :: 901113A 940 Ddt Refman May67 by published by
来源: 评论
Tektronix :: 85Xx :: 8540 :: 070-3939-00 8540 System Users Manual Os40 Ver 1 Jan83
收藏 引用
2016年
Tektronix :: 85Xx :: 8540 :: 070-3939-00 8540 System Users Manual Os40 Ver 1 Jan83 by published by
来源: 评论
MetropolJS: Visualizing and Debugging Large-Scale JavaScript program Structure with Treemaps
MetropolJS: Visualizing and Debugging Large-Scale JavaScript...
收藏 引用
IEEE Workshop on program Comprehension
作者: Joshua D Scarsbrook Ryan K L Ko Bill Rogers David Bainbridge University of Waikato
As a result of the large scale and diverse composition of modern compiled JavaScript applications, comprehending overall program structure for debugging is challenging. In this paper we present our solution: MetropolJ... 详细信息
来源: 评论
Predicting execution Time of Computer programs Using Sparse Polynomial Regression  10
Predicting Execution Time of Computer Programs Using Sparse ...
收藏 引用
Annual Conference on Neural Information Processing Systems
作者: Ling Huang Byung-Gon Chun Jinzhu Jia Petros Maniatis Bin Yu Mayur Naik Intel Labs Berkeley UC Berkeley
Predicting the execution time of computer programs is an important but challenging problem in the community of computer systems. Existing methods require experts to perform detailed analysis of program code in order t... 详细信息
来源: 评论
Charting a Course Through Uncertain Environments: SEA Uses Past Problems to Avoid Future Failures
Charting a Course Through Uncertain Environments: SEA Uses P...
收藏 引用
International Symposium on Software Reliability Engineering (ISSRE)
作者: Preston Moore Justin Cappos Phyllis Frankl Thomas Wies New York University
A common problem for developers is applications exhibiting new bugs after deployment. Many of these bugs can be traced to unexpected network, operating system, and file system differences that cause program executions... 详细信息
来源: 评论
Establishing Performance Guarantees for Behavior-Based Robot Missions Using an SMT Solver
Establishing Performance Guarantees for Behavior-Based Robot...
收藏 引用
Proceedings of ISR 2016: 47st International Symposium on Robotics
作者: Feng Tang Damian M. Lyons Ronald C. Arkin
In prior work [9] we developed an approach to formally representing behavior-based multi-robot programs, and the uncertain environments in which they operate, as process networks. We automatically extract a set of pro... 详细信息
来源: 评论
Comparison of memory write policies for NoC based Multicore Cache Coherent Systems  08
Comparison of memory write policies for NoC based Multicore ...
收藏 引用
2008 Design, Automation and Test in Europe (DATE 2008), vol.2
作者: Pierre Guironnet de Massas Frederic Petrot System-Level Synthesis Group TIMA Laboratory Grenoble France
The following study shows a direct comparison of memory write policies in Shared Memory Multicore Systems. Although there are much work and many studies about this issue, our work takes into account the difficulties r... 详细信息
来源: 评论
Re-Configurable Bus Encoding Scheme for Reducing Power Consumption of the Cross Coupling Capacitance for Deep Sub-Micron Instruction Bus  04
Re-Configurable Bus Encoding Scheme for Reducing Power Consu...
收藏 引用
Proceedings of the conference on Design, automation and test in Europe - Volume 1
作者: Siu-Kei Wong Chi-Ying Tsui
In very deep sub-micron designs, cross coupling capacitances become the dominant factor of the total bus loading and have a significant impact on the power consumption. In this paper, we propose two reconfigurable bus... 详细信息
来源: 评论
BARLEY: Modelling program Behavior with Resource Usage
BARLEY: Modelling Program Behavior with Resource Usage
收藏 引用
Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops
作者: Kevin Leach Center for Secure Information Systems George Mason University
Control flow graphs (CFG) have long been an effective and elegant way to represent program execution. In particular, many anomaly detection systems employ CFGs. Unfortunately, typical CFG-based systems rely on inaccur... 详细信息
来源: 评论