咨询与建议

限定检索结果

文献类型

  • 130 篇 期刊文献
  • 114 篇 会议

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 222 篇 工学
    • 210 篇 计算机科学与技术...
    • 167 篇 软件工程
    • 14 篇 电气工程
    • 12 篇 控制科学与工程
    • 8 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 化学工程与技术
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 93 篇 理学
    • 90 篇 数学
    • 4 篇 化学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 38 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 3 篇 经济学
    • 3 篇 应用经济学
    • 1 篇 理论经济学
  • 3 篇 教育学
    • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 244 篇 programming theo...
  • 10 篇 programming and ...
  • 6 篇 software enginee...
  • 5 篇 software testing
  • 4 篇 high level langu...
  • 3 篇 programming
  • 3 篇 ada
  • 3 篇 graph theory
  • 3 篇 software reliabi...
  • 3 篇 program verifica...
  • 3 篇 wireless mesh ne...
  • 3 篇 formal specifica...
  • 3 篇 capacity optimiz...
  • 3 篇 programming envi...
  • 3 篇 channel allocati...
  • 2 篇 parallel process...
  • 2 篇 formal logic
  • 2 篇 automation
  • 2 篇 automatic testin...
  • 2 篇 reliability theo...

机构

  • 2 篇 univ of pennsylv...
  • 2 篇 mgu im. m.v. lom...
  • 2 篇 moskovskij gosud...
  • 2 篇 inria rocquencou...
  • 2 篇 ecole des mines ...
  • 2 篇 inst kibernetiki...
  • 2 篇 aarhus univ aarh...
  • 2 篇 univ oxford comp...
  • 2 篇 city univ london...
  • 2 篇 eindhoven univ t...
  • 2 篇 univ calif berke...
  • 2 篇 univ of nottingh...
  • 1 篇 beijing univ of ...
  • 1 篇 poznan universit...
  • 1 篇 addis ababa univ...
  • 1 篇 hewlett-packard ...
  • 1 篇 technion israel ...
  • 1 篇 johann wolfgang ...
  • 1 篇 national institu...
  • 1 篇 at&t research

作者

  • 3 篇 liu yanhong a.
  • 2 篇 banach r
  • 2 篇 stuckey peter j.
  • 2 篇 kiselyov oleg
  • 2 篇 cousot patrick
  • 2 篇 desharnais j
  • 2 篇 zakharov v.a.
  • 2 篇 duggan d
  • 2 篇 nielson flemming
  • 2 篇 stoller scott d.
  • 2 篇 nielson hanne ri...
  • 2 篇 henzinger thomas...
  • 2 篇 sheard tim
  • 2 篇 mili a
  • 2 篇 rehof jakob
  • 1 篇 merz stephan
  • 1 篇 davidov mikhail
  • 1 篇 puel laurence
  • 1 篇 mai zhongfan
  • 1 篇 ignatushchenko v...

语言

  • 211 篇 英文
  • 17 篇 其他
  • 12 篇 俄文
  • 4 篇 中文
检索条件"主题词=Programming theory"
244 条 记 录,以下是81-90 订阅
排序:
On an algorithm solving two-level programming problems with nonunique lower level solutions
收藏 引用
Computational Optimization and Applications 1996年 第3期6卷 227-249页
作者: Dempe, S. Schmidt, H. Technical Univ Chemnitz-Zwickau Chemnitz Germany
In the paper, an algorithm is presented for solving two-level programming problems. This algorithm combines direction finding problem with a regularization of the lower level problem. The upper level objective functio... 详细信息
来源: 评论
From sequential programs to concurrent threads
IEEE Computer Architecture Letters
收藏 引用
IEEE Computer Architecture Letters 2006年 第1期5卷 6-9页
作者: Ottoni, Guilherme Rangan, Ram Stoler, Adam Bridges, Matthew J. August, David I. Departments of Computer Science and Electrical Engineering Princeton University
Chip multiprocessors are of increasing importance due to recent difficulties in achieving higher clock frequencies in uniprocessors, but their success depends on finding useful work for the processor cores. This paper... 详细信息
来源: 评论
NSTO PROGRAMS (NOT SUBJECT TO OCCUR-CHECK)
NSTO PROGRAMS (NOT SUBJECT TO OCCUR-CHECK)
收藏 引用
INTERNATIONAL SYMP ON LOGIC programming
作者: DERANSART, P FERRAND, G TEGUIA, M INRIA Le Chesnay France
The occur-check problem arises from the omission of the ``occur-check'' test in the implementation of the unification algorithm in the PROLOG interpreters. This may cause loops or unsound successes. Even an un... 详细信息
来源: 评论
On the Schedulability of Real-Time Discrete-Event Systems
On the Schedulability of Real-Time Discrete-Event Systems
收藏 引用
International Conference on Embedded Software (EMSOFT)
作者: Matsikoudis, Eleftherios Stergiou, Christos Lee, Edward A. Univ Calif Berkeley Berkeley CA 94720 USA
We consider end-to-end latency specifications for hard real-time embedded systems. We introduce a discrete-event programming model generalizing such specifications, and address its schedulability problem for uniproces... 详细信息
来源: 评论
1956-1966 how did it all begin? Issues then and now
1956-1966 how did it all begin? Issues then and now
收藏 引用
29th Annual German Conference on Artificial Intelligence
作者: Minsky, Marvin MIT Media Lab Cambridge MA 02139 USA
Many computer programs today show skills that appear to rival those of outstanding human consultants. However, while each such program does certain things well, it is helpless at doing anything else. Why do our presen... 详细信息
来源: 评论
A new securely running mechanism and programming model based on WorkerApplet thread in Elastos
A new securely running mechanism and programming model based...
收藏 引用
5th International Conference on Computer and Information Technology
作者: Chen, ZC Mao, MY Yu, C Zhou, LZ Yang, WK Tsing Hua Univ Inst Informat Beijing 100084 Peoples R China
With the transferring and development of the application of computer operating system from desktop to network, in the next generation of internet operating system, it is more and more important to consider the securit... 详细信息
来源: 评论
REGISTER ESTIMATION FROM BEHAVIORAL SPECIFICATIONS
REGISTER ESTIMATION FROM BEHAVIORAL SPECIFICATIONS
收藏 引用
1994 IEEE International Conference on Computer Design - VLSI in Computers and Processors (ICCD 94)
作者: SHARMA, A JAIN, R HEWLETT PACKARD CORP ROSEVILLECA 95747
In this paper we provide answers to the following problems. 1. Given a data flow graph and a performance constraint, determine a lower-bound on the storage area required for executing the data flow graph while satisfy... 详细信息
来源: 评论
On loop restructuring by converting imperfect to perfect loop nests
On loop restructuring by converting imperfect to perfect loo...
收藏 引用
1996 IEEE 2nd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 96)
作者: Xue, JL Univ of New England Armidale Australia
In the case of imperfect loop nests, some researchers suggested to first use Abu-Sufah's Non-Basic-to-Basic-loop transformation to convert them into perfect loop nests and then apply the unimodular transformation ... 详细信息
来源: 评论
MIXING LIST RECURSION AND ARITHMETIC
MIXING LIST RECURSION AND ARITHMETIC
收藏 引用
7TH ANNUAL SYMP ON LOGIC IN COMPUTER SCIENCE ( LICS 92 )
作者: FRIBOURG, L LIENS Paris France
A procedure that constructs mechanically the appropriate lemmas for proving assertions about programs with arrays is described. A certain subclass of formulas for which the procedure is guaranteed to terminate and thu... 详细信息
来源: 评论
A continuum of theories of lambda calculus without semantics
A continuum of theories of lambda calculus without semantics
收藏 引用
16th Annual IEEE Symposium on Logic in Computer Science
作者: Salibra, A Univ Venice Dipartimento Informat I-30172 Venice Italy
In this paper we give a topological proof of the following result. There exist 2(N0) lambda theories of the untyped lambda calculus without a model in any semantics based on Scott's view of models as partially ord... 详细信息
来源: 评论