-
1
-
-
76749118842
-
TRainbow: A new trusted virtual machine based platform
-
Y. Sun, H. Fang, Y. Song, L. Du, K. Zhang, H. Zang, et al., "TRainbow: a New Trusted Virtual Machine Based Platform", Frontiers of Computer Science in China, 2010, Vol.4, No.1, pp. 47-64.
-
(2010)
Frontiers of Computer Science in China
, vol.4
, Issue.1
, pp. 47-64
-
-
Sun, Y.1
Fang, H.2
Song, Y.3
Du, L.4
Zhang, K.5
Zang, H.6
-
3
-
-
0036962038
-
Challenges: Environmental design for pervasive computing systems
-
R. Jain and John Wullert, II, "Challenges: Environmental Design for Pervasive Computing Systems", MOBICOM'02, p.263-270.
-
MOBICOM'02
, pp. 263-270
-
-
Jain, R.1
Wullert, I.I.J.2
-
4
-
-
0346750535
-
Leakage current: Moore's law meets static power
-
N. S. Kim, T. Austin, D. Baauw, T. Mudge, K. Flautner, J. S. Hu, et al., "Leakage Current: Moore's Law Meets Static Power", IEEE Computer, 2003,Vol.36, no.12,pp. 68-75.
-
(2003)
IEEE Computer
, vol.36
, Issue.12
, pp. 68-75
-
-
Kim, N.S.1
Austin, T.2
Baauw, D.3
Mudge, T.4
Flautner, K.5
Hu, J.S.6
-
5
-
-
0035806213
-
Molecular random access memory cell
-
DOI 10.1063/1.1377042
-
M. A. Reed, J. Chen, A. M. Rawlett, D. W. Price, and J. M. Tour, "Molecular Random Access Memory cell", App. Phys. Lett., 2001, 78:3735-3737. (Pubitemid 33599299)
-
(2001)
Applied Physics Letters
, vol.78
, Issue.23
, pp. 3735-3737
-
-
Reed, M.A.1
Chen, J.2
Rawlett, A.M.3
Price, D.W.4
Tour, J.M.5
-
6
-
-
77953946278
-
Software development and crunch time; And more
-
R. Ortega, M. Guzdial, and D. Reed, "Software development and crunch time; and more", Communications of the ACM, 2010, Vol.53, No.7, pp: 10-11.
-
(2010)
Communications of the ACM
, vol.53
, Issue.7
, pp. 10-11
-
-
Ortega, R.1
Guzdial, M.2
Reed, D.3
-
7
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
A. Bessey, K. Block, B. Chelf, A. Chou, B. Fulton, S. Hallem, et al., "A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World", Communications of the ACM, Vol. 53 No. 2, P.66-75.
-
Communications of the ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Bessey, A.1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
-
9
-
-
0018491812
-
Optimal decomposition of large-scale networks
-
J. G. Lee, W. G. Vogt, and M. H. Mickle, "Optimal Decomposition of Large-Scale Networks", IEEE Trans. on SYSTEMS, MAN, AND CYBERNETICS, 1979, Vol. SMC-9, No.7, pp.369-375.
-
(1979)
IEEE Trans. on Systems, Man, and Cybernetics
, vol.SMC-9
, Issue.7
, pp. 369-375
-
-
Lee, J.G.1
Vogt, W.G.2
Mickle, M.H.3
-
12
-
-
77954692717
-
Identifying crosscutting concerns using historical code changes
-
May 2-8, Cape Town, South Africa
-
B. Adams, Z. Jiang, and A. E. Hassan, "Identifying Crosscutting Concerns Using Historical Code Changes", ACM ICSE' 10, May 2-8 2010, Cape Town, South Africa, pp.305-314.
-
(2010)
ACM ICSE' 10
, pp. 305-314
-
-
Adams, B.1
Jiang, Z.2
Hassan, A.E.3
-
15
-
-
0032665183
-
An architecture-based approach to self-adaptive software
-
P. Oreizy, M. M. Gorlick, R. N. Taylor, D. Heimhigner, G. Johnson, N. Medvidovic, et al., "An Architecture-Based Approach to Self-Adaptive Software", IEEE INTELLIGENT SYSTEMS, 1999, p.54-62.
-
(1999)
IEEE INTELLIGENT SYSTEMS
, pp. 54-62
-
-
Oreizy, P.1
Gorlick, M.M.2
Taylor, R.N.3
Heimhigner, D.4
Johnson, G.5
Medvidovic, N.6
-
17
-
-
4243075267
-
Software reuse strategies and component markets
-
T. Ravichandran, and M. A. Rothenberger, "Software reuse strategies and component markets", Communications of the ACM, Vol. 46, Issue 8, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
-
-
Ravichandran, T.1
Rothenberger, M.A.2
-
18
-
-
46449091041
-
Establishing recommendation trust relationships for internetwares
-
January
-
Y. Wang, F. Xu, and J. Lv, "Establishing Recommendation Trust Relationships for Internetwares", ACM SIGSOFT Software Engineering Notes, January 2006, Vol. 31, No. 1, pp. 1-5.
-
(2006)
ACM SIGSOFT Software Engineering Notes
, vol.31
, Issue.1
, pp. 1-5
-
-
Wang, Y.1
Xu, F.2
Lv, J.3
|